A ____ is a list of discrete entities that are known to be benign.

A. blacklist
B. hot list
C. whitelist
D. clean list

Answer: C

Computer Science & Information Technology

You might also like to view...

A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application?

A. CAT5e cable B. Coax cable C. Fiber Optic cable D. CAT6 cable

Computer Science & Information Technology

Which of the following is true about protected access?

a. Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package. b. Protected members may be accessed by methods in the same package or in a subclass, but only if the subclass is in the same package. c. Protected members cannot be accessed by methods in any other classes. d. Protected members are actually named constants.

Computer Science & Information Technology