Which type of security measure reduces the likelihood of a deliberate attack?

A. Preventive countermeasures
B. Detection activities
C. Corrective procedures
D. Deterrents

Answer: D

Computer Science & Information Technology

You might also like to view...

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?

A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7

Computer Science & Information Technology

Suppose that the coordinator of a transaction crashes after it has recorded the intentions list entry but before it has recorded the participant list or sent out the canCommit? requests. Describe how the participants resolve the situation. What will the coordinator do when it recovers? Would it be any better to record the participant list before the intentions list entry?

What will be an ideal response?

Computer Science & Information Technology