A feature that creates a copy of the original database to protect against lost data
a. Trusted source
b. Trusted document
c. Backup
C
You might also like to view...
Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?
A) Certification authority B) Registration authority C) Client nodes D) Digital certificate
Windows 7 uses approximately ________ lines of code
A) 500,000 B) 2 billion C) 50 million D) 100,000
Style sheets referred to as ____ are often used to create a standard look and feel for a site.
A. NSS B. CSS C. MOD D. MID
A ____ resides on a computer or appliance connected to a segment of an organization's network and monitors network traffic on that network segment - much like tcpdump - looking for indications of ongoing or successful attacks.
A. network-based IDPS (NIDPS) B. host-based IDPS (HIDPS) C. wireless IDPS D. network behavior analysis (NBA) system