Multiple Choice
____ is a strategy that contributes to system recovery.
A) Authentication
B) Integrity checking
C) Data replication
D) Encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: A virus is defined as a small
Q7: Intruders have been known to capture user
Q12: _ viruses infect data files.<br>A) File infector<br>B)
Q15: When nonsynchronized processes access data records and
Q16: The most extreme form of encryption is
Q19: Any vulnerability at the operating system level
Q21: The object used by the Kerberos protocol
Q23: Trash collection, also known as _, is
Q25: _ has the highest level of risk.<br>A)
Q26: There are several guaranteed methods of protecting