__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
A. Firewalling
B. Hosting
C. Redundancy
D. Domaining
Answer: C
Computer Science & Information Technology
You might also like to view...
Working with root privileges, you are planning to delete some files but want to make sure that the wildcard expression you use is correct. Suggest two ways you could make sure you delete the correct files.
What will be an ideal response?
Computer Science & Information Technology
In its early years, the Internet was used primarily by the government, scientists, and educational institutions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology