Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year

a. Once
b. Twice
c. Three times
d. None of the above

Answer A. This would include probing your ports.

Computer Science & Information Technology

You might also like to view...

A(n) Project ________ in Project 2013 is a Project file that contains sample project information such as tasks, durations, resources, and other project data

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements about inserting online videos into a Web page is FALSE?

A) You will see a live preview. B) The online video is embedded into the Web page. C) You can view the video directly within the context of the document itself. D) You do not have to leave your open document to go to another window.

Computer Science & Information Technology