Which devices can be installed with power applied to the computer? (Select three.)
A) ExpressCard
B) PS/2 port-attached device
C) USB device
D) PCIe adapter
E) NIC cable
A, C, E
You might also like to view...
A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n)
a. total backup. b. incremental backup. c. image backup. d. modification backup.
Your company did not know its internal customer and financial databases were compromised until the attacker published sensitive portions of the database on several popular attacker websites. The company was unable to determine when, how, or who conducted the attacks but rebuilt, restored, and updated the compromised database server to continue operations. What is MOST likely the cause for the
company's inability to determine what really occurred? A. too many layers of protection between the Internet and internal network B. lack of a defined security auditing process C. poor intrusion detection system placement and maintenance D. insufficient logging and mechanisms for review