Very fast memory that is used to store frequently accessed information close to the processor.

What will be an ideal response?

Cache memory

Computer Science & Information Technology

You might also like to view...

You can create several possible solutions to a problem and then use Excel's ________ tool to compare the alternatives

A) Solver B) Option Manager C) Scenario Manager D) Evaluate Formula

Computer Science & Information Technology

Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.Which of the following would have allowed the security team to use historical information to protect against the second attack?

A. Key risk indicators B. Lessons learned C. Recovery point objectives D. Tabletop exercise

Computer Science & Information Technology