题目内容

can be used to achieve integrity and secrecy for data.

A. Restricting access
B. Encryption
C. Data layering
D. Backing up data

查看答案
更多问题

It is very important that we should not in protecting computer system.

A. display our passwords for everyone to see
B. open unidentified files
C. leave computer terminals on while we are away from our desks
D. all of the above

All electronic communications coming into and leaving the corporation must be evaluated by the.

A. passwords
B. firewall
C. gateway
D. buffer

A virus is a.

A. Program
B. computer
C. bad man
D. beast

Many viruses go resident in the memory like a.

A. exe file
B. com file
C. TSR program
D. data file

答案查题题库