Jane, the security administrator, needs to be able to test malicious code in an environment where it will not harm the rest of the network. Which of the following would allow Jane to perform this kind of testing?
A. Local isolated environment
B. Networked development environment
C. Infrastructure as a service
D. Software as a Service
Answer: A. Local isolated environment
Computer Science & Information Technology
You might also like to view...
How does a form simplify data entry (when compared to entering data into a table)?
What will be an ideal response?
Computer Science & Information Technology
Using ____, you quickly can categorize or flag your email messages as they arrive so that you can identify at a glance which ones you first want to address.
A. rules B. stipulations C. dictates D. signatures
Computer Science & Information Technology