________ assessments are a type of security check that involve carrying out a configuration-level check through the command line.

A. Active
B. Internal
C. Passive
D. Host-based


Answer: D. Host-based

Computer Science & Information Technology

You might also like to view...

int sum = 0;int limit = console.nextInt();int counter = 0;while (counter <= limit){      entry = console.nextInt();      sum = sum + entry;      counter++;}System.out.println(sum);The above code is an example of a(n) ____ while loop.

A. flag-controlled B. counter-controlled C. EOF-controlled D. sentinel-controlled

Computer Science & Information Technology

The view in which you work when adding ActiveX controls to your worksheet is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

If an insert was in ____, the root must be rotated.

A. an even balanced tree B. the shorter subtree of a tree that was not even balanced C. the higher subtree of a tree that was not even balanced D. an unbalanced tree

Computer Science & Information Technology

A semiheap is a ______.

a) table b) complete binary tree c) general tree d) full binary tree

Computer Science & Information Technology