Outsiders might try to infect your system through all of the following, EXCEPT ________

A) contaminated USB drives
B) e-mail messages
C) Bluetooth pairing
D) Internet downloads


C

Computer Science & Information Technology

You might also like to view...

Dynamically allocated memory that is no longer pointed to by any pointer variable causes a ______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a variable or constant that is needed to produce output for a function in a calculated field

A) expression B) formula C) function D) argument

Computer Science & Information Technology

Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The company's sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports. Which of the following controls is preventing them from completing their work?

A. Discretionary access control B. Role-based access control C. Time of Day access control D. Mandatory access control

Computer Science & Information Technology