The activities that ensure the overall security of the system during routine operation are known as ____.

A. monitoring duties
B. evaluation duties
C. functional duties
D. operational duties


Answer: D

Computer Science & Information Technology

You might also like to view...

From the choices below select the correct order to code CSS pseudo-classes.

a. link, hover, visited, active b. hover, link, active, visited c. link, visited, hover, active d. link, hover, active, visited

Computer Science & Information Technology

A worm creates files that copy themselves repeatedly and consume disk space.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A text file can be converted from tab delimited text to a Word table by selecting the ________ command that easily converts a tabbed file into a table

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a Windows computer cannot connect to the server that has the antivirus application and updates but can connect to other internal web servers and printers, what should the technician check first?

A) Windows firewall settings B) Antivirus server settings C) Device Manager D) Registry settings

Computer Science & Information Technology