Which of the following is used to ensure information integrity?
A) Auditing
B) Digital signatures
C) Backups
D) Passwords
B) Digital signatures
You might also like to view...
The purpose of the DHCP protocol is:
a. Assign IP address and subnet mask to a station b. Assign default gateway address to a station c. All of these d. Assign DNS and WINS server addresses to a station
Creating a "template world" as a starting scene can be an effective way to reuse transitions in a story.
Answer the following statement true (T) or false (F)
When you paste Excel data into a Word document, the data:
A) are pasted into table cells. B) retain Excel spreadsheet capabilities. C) convert to symbols. D) retain Excel spreadsheet formatting.
COGNITIVE ASSESSMENT Which network type connects each computer and device to a central device?
A. a bus network B. a ring network C. a star network D. a core network