To monitor the health of the file system on a disk, use disk-checking ________

Fill in the blank(s) with correct word

utilities, programs

Computer Science & Information Technology

You might also like to view...

The security administrator receives an email on a non-company account from a coworker stating that some reports are not exporting correctly. Attached to the email was an example report file with several customers' names and credit card numbers with the PIN.Which of the following is the BEST technical controls that will help mitigate this risk of disclosing sensitive data?

A. Configure the mail server to require TLS connections for every email to ensure all transport data is encrypted B. Create a user training program to identify the correct use of email and perform regular audits to ensure compliance C. Implement a DLP solution on the email gateway to scan email and remove sensitive data or files D. Classify all data according to its sensitivity and inform the users of data that is prohibited to share

Computer Science & Information Technology

The _____________ namespace contains most of C#’s file-processing classes

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology