can be used to achieve integrity and secrecy for data.
A. Restricting access
B. Encryption
C. Data layering
D. Backing up data
查看答案
It is very important that we should not in protecting computer system.
A. display our passwords for everyone to see
B. open unidentified files
C. leave computer terminals on while we are away from our desks
D. all of the above
All electronic communications coming into and leaving the corporation must be evaluated by the.
A. passwords
B. firewall
C. gateway
D. buffer
A virus is a.
A. Program
B. computer
C. bad man
D. beast
Many viruses go resident in the memory like a.
A. exe file
B. com file
C. TSR program
D. data file