A ____ is a representation of the security policy of the OS.

A. security plan
B. security tree
C. security infrastructure
D. security model


Answer: D

Computer Science & Information Technology

You might also like to view...

_________ can be restored from a backup

A) Tables B) Queries C) Macros D) All database objects

Computer Science & Information Technology

Field name display in database objects such as datasheets, forms, and reports is determined by the ____________________ property.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following could be a major concern for implementing cloud computing for business-critical services?

A. Incompatible software, hardware, or operating systems. B. Being charged for computing services that go unused. C. A cloud provider’s inability to scale up or down. D. An intermittent or unavailable Internet connection.

Computer Science & Information Technology

The _____ _____ interface lets users interact with menus and icons to carry out functions of the computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology