The cipher command works on _______________.

A. attributes
B. directories
C. disk drives
D. tables

Answer: B

Computer Science & Information Technology

You might also like to view...

An enterprise technician is tasked to implement a disk array that will host continuous disk-to-disk replication. Which of the following storage types should be selected for maximum performance?

A. USB B. SCSI C. SATA D. SAS

Computer Science & Information Technology

When would you use a linked list over an array or a dynamic array?

a. when you know the maximum size at compile time b. when you know the maximum size at run-time c. when you do not know the maximum size d. when you need to access any item quickly

Computer Science & Information Technology