When you add a rule to a DB security group, you do not need to specify port number or protocol.
A. Depends on the RDMS used
B. TRUE
C. FALSE
Answer: B. TRUE
Computer Science & Information Technology
You might also like to view...
The flag to display floating point numbers in non-scientific notation is ios:: _________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Including one or more if statements inside an existing if statement is called a ____ if statement.
A. compound B. complex C. nested D. chain
Computer Science & Information Technology
What is the best way project management can ensure change requests (CR) are appropriately managed?
A. let the team leads handle CRs B. make sure all CRs are testes C. put all CR through he normal development methodology D. create a Change Control Board (CCB)
Computer Science & Information Technology
What is meant by the phrase "security through obscurity," and why is this concept not accurate?
What will be an ideal response?
Computer Science & Information Technology