Computers and Technology

QUESTION 1 What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks? a. least functionality b. whitelisting c. function limiting d. blacklisting 10 points QUESTION 2 Which application development life-cycle model uses a sequential design process? a. waterfall b. agile c. serial d. linear 10 points QUESTION 3 What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance? a. ITV b. IPTV c. CCTV d. ICTV 10 points QUESTION 4 What U. S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings? a. TEMPEST b. RAIN c. MaSec d. EMIF 10 points QUESTION 5 How can an area be made secure from a non-secured area via two interlocking doors to a small room? a. Using a mantrap b. Using a closet c. Using a pit d. Using a lockout 10 points QUESTION 6 What publicly released software security update is intended to repair a vulnerability? a.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 01:00, toottoot42169
What can you find the under the privacy policy section of a shopping website?
Answers: 1
image
Computers and Technology, 22.06.2019 08:30, ruddymorales1123
Linda subscribes to a cloud service. the service provider hosts the cloud infrastructure and delivers computing resources over the internet. what cloud model is linda using
Answers: 1
image
Computers and Technology, 23.06.2019 06:30, jayjay5246
Which option correctly describes a dbms application? a. software used to manage databases b. software used to organize files and folders c. software used to develop specialized images d. software used to create effective presentations
Answers: 1
image
Computers and Technology, 23.06.2019 09:00, amberpublow7
Which best describes the role or restriction enzymes in the analysis of edna a. to break dna into fragments that vary in size so they can be sorted and analyzed b. to amplify small amounts of dna and generate large amounts of dna for analysis c. to purify samples of dna obtained from the environment so they can be analyzed d. to sort different sizes of dna fragments into a banding pattern that can be analyzed
Answers: 1
Do you know the correct answer?
QUESTION 1 What security concept states a user should only be given the minimum set of permissions r...

Questions in other subjects:

Konu
Mathematics, 12.01.2021 14:00
Konu
Computers and Technology, 12.01.2021 14:00
Konu
Physics, 12.01.2021 14:00
Konu
Mathematics, 12.01.2021 14:00