.cst files that are locked for distribution have the ____ file extension.

A. .cxt
B. .dir
C. .dcr
D. .dxr

Answer: A

Computer Science & Information Technology

You might also like to view...

When a line of text contains a revision, a ________ displays in the left margin

A) balloon B) comment C) horizontal change bar D) vertical change bar

Computer Science & Information Technology

____________________, also known as "fuzzing," is a straight-forward technique that looks for vulnerabilities in a program or protocol by feeding random input into the program or the network running the protocol.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology