Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
A. malware management
B. inventory permissions
C. application whitelist
D. application control
Answer: C
Computer Science & Information Technology
You might also like to view...
A computer can have a permanently assigned ____ IP address.
A. standard B. flexible C. static D. dynamic
Computer Science & Information Technology
If you change your mind about the theme you selected for a presentation, you can change it by clicking the _______ tab, then clicking any theme from the Themes group.
A. HOME B. PREVIEW C. VIEW D. DESIGN
Computer Science & Information Technology
Which of the following DATE_FORMAT() format codes denotes the day of the year, numeric?
a. %j b. %p c. %Y d. %D
Computer Science & Information Technology
____________________ is a security measure that uses the public network infrastructure, such as the Internet, as part of a Virtual Private Network.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology