What is used to identify all objects in a domain?
A. PDC
B. SID
C. RID
D. DIR
Answer: B
Computer Science & Information Technology
You might also like to view...
A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle.Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?
A. Architecture review B. Risk assessment C. Protocol analysis D. Code review
Computer Science & Information Technology
A ______ contains one record.
A. cell B. column C. row D. table
Computer Science & Information Technology