Which security process records the occurrence of specific operating system events in the Security log?
A. Encrypting
B. Hashing
C. Filtering
D. Auditing
Answer: D
You might also like to view...
Which of the following statements is false?
a. Variables or functions listed after the public access specifier (and before the next access specifier, if there is one) are “available to the public.” They can be used by other functions in the program, and by member functions of other classes. b. By default, everything in a class is private, unless you specify otherwise. c. You must list an access specifier for every member. d. Declaring data members private is known as data hiding. private data members are encapsulated (hidden) in an object and can be accessed only by member functions of the object’s class.
The ____ option is used to retrieve documents that would otherwise be lost as a result of system glitches or unplanned shutdowns.
A. AutoRetrieve B. AutoRecover C. AutoRestore D. AutoReplace
?When Magnifier is enabled
A. ?the entire contents of the desktop cannot fit on the screen at one time. B. ?the entire contents of the desktop can fit on the screen at one time. C. ?only select portions are enlarged. D. ?the narrator reads what is enlarged.
The problem with the lexical m-ary tree is that after a few levels it becomes very large. To prevent this, we ____ the tree; that is, we cut all of the branches that are not needed.
A. cleanse B. depurate C. prune D. fix