What is a means to ensure that endpoint devices can interact with the Internet while minimizing risk of system compromise?

A. Only use encrypted communication protocols.
B. Use strong authentication.
C. Use a virtualized OS.
D. Implement a weekly backup.


Answer: C. Use a virtualized OS.

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, areas not selected are represented by ____.

A. white B. pixels C. black D. color

Computer Science & Information Technology

A graph is a collection of vertices connected by lines.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Consider the following class definitions:class bClass{public:void setX(int a);//Postcondition: x = a;void print() const;private:int x;};class dClass: public bClass{public:void setXY(int a, int b);//Postcondition: x = a; y = b;void print() const;private:int y;};Which of the following correctly sets the values of x and y?

A. void dClass::setXY(int a, int b) { bClass::setX(a); y = b; } B. void dClass::setXY(int a, int b) { x = a; y = b; } C. void dClass::setXY(int a, int b) { x = bClass::setX(a); y = bClass::setY(b); } D. void dClass::setXY(int a, int b) { x = bClass.setX(a); b = y; }

Computer Science & Information Technology

If you precede a subquery by the ____________________ operator, the condition is true only if it satisfies all values produced by the subquery.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology