E-mail attachments with the extension _____ are especially vulnerable to being blocked.

A. .doc
B. .exe
C. .txt
D. .jpg

Answer: B

Computer Science & Information Technology

You might also like to view...

What type of model is identity-based access control?

a. Mandatory access control b. Discretionary access control c. Nondiscretionary access control d. Transitive-discretionary access control

Computer Science & Information Technology

PowerPoint numbers slide elements consecutively.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology