Usually, the first thing you do to a computer to prevent further tampering is to _________
a. Make a backup.
b. Make a copy.
c. Take it offline.
d. Lock it in a secure room.
Answer C.
Computer Science & Information Technology
You might also like to view...
Use the man command to display the online manual pages of the grep command. How many versions of grep does your system support? Write down the names of these versions. How would you display a brief description of the built-in command set?
What will be an ideal response?
Computer Science & Information Technology
Give an example of a deadlock involving only a single process and a single resource.
What will be an ideal response?
Computer Science & Information Technology