Which type of security measure reduces the likelihood of a deliberate attack?
A. Preventive countermeasures
B. Detection activities
C. Corrective procedures
D. Deterrents
Answer: D
Computer Science & Information Technology
You might also like to view...
A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?
A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7
Computer Science & Information Technology
Suppose that the coordinator of a transaction crashes after it has recorded the intentions list entry but before it has recorded the participant list or sent out the canCommit? requests. Describe how the participants resolve the situation. What will the coordinator do when it recovers? Would it be any better to record the participant list before the intentions list entry?
What will be an ideal response?
Computer Science & Information Technology