E-mail attachments with the extension _____ are especially vulnerable to being blocked.
A. .doc
B. .exe
C. .txt
D. .jpg
Answer: B
Computer Science & Information Technology
You might also like to view...
What type of model is identity-based access control?
a. Mandatory access control b. Discretionary access control c. Nondiscretionary access control d. Transitive-discretionary access control
Computer Science & Information Technology
PowerPoint numbers slide elements consecutively.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology