A feature that creates a copy of the original database to protect against lost data

a. Trusted source
b. Trusted document
c. Backup


C

Computer Science & Information Technology

You might also like to view...

Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?

A) Certification authority B) Registration authority C) Client nodes D) Digital certificate

Computer Science & Information Technology

Windows 7 uses approximately ________ lines of code

A) 500,000 B) 2 billion C) 50 million D) 100,000

Computer Science & Information Technology

Style sheets referred to as ____ are often used to create a standard look and feel for a site.

A. NSS B. CSS C. MOD D. MID

Computer Science & Information Technology

A ____ resides on a computer or appliance connected to a segment of an organization's network and monitors network traffic on that network segment - much like tcpdump - looking for indications of ongoing or successful attacks.

A. network-based IDPS (NIDPS) B. host-based IDPS (HIDPS) C. wireless IDPS D. network behavior analysis (NBA) system

Computer Science & Information Technology