Answers
Answer updated on: 12 Feb 2020
A. A system downtime log A system downtime log provides information regarding the effectiveness and adequacy of computer preventive maintenance programs.
Answer updated on: 12 Feb 2020
A. consistent way for transferring data to the application program and back to the user. The common gateway interface (CGI) is a standard way for a web server to pass a users request to an application program and to move data back and forth to the user. When the user requests a web page (for example, by clicking on a highlighted word or entering a web site address), the server sends back the ...
Answer updated on: 12 Feb 2020
A. establish ownership. Data classification is necessary to define access rules based on a need-to-do and need-to-know basis. The data owner is responsible for defining the access rules; hence, establishing ownership is the first step in data classification. The other choices are incorrect. A criticality analysis is required for protection of data, which takes input from data classification. ...
Answer updated on: 12 Feb 2020
D. AlterationA digital signature includes an encrypted hash total of the size of the message as it was transmitted by its originator. This hash would no longer be accurate if the message was subsequently altered, thus indicating that the alteration had occurred. Digital signatures will not identify or prevent any of the other options. Digital signature will not address other concerns.
Answer updated on: 12 Feb 2020
B. Non-repudiationNon-repudiation is the assurance that someone cannot deny something. Non-repudiation services provide evidence that a specific action occurred Typically, non-repudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.. Digital signatures ...
Answer updated on: 12 Feb 2020
D. Unauthorized system actions are recorded but not investigated. If unauthorized system actions are not investigated, the log is useless. Not backing up logs periodically is a risk, but not as critical as the need to investigate questionable actions. Recording routine events can make it more difficult to recognize unauthorized actions, but the critical events are still recorded. Procedures for ...
Answer updated on: 12 Feb 2020
B. Configuration management Configuration management accounts for all IT components, including software. Project management is about scheduling, resource management and progress tracking of software development. Problem management records and monitors incidents. Risk management involves risk identification, impact analysis, an action plan, etc.
Answer updated on: 12 Feb 2020
A. throughput. Throughput measures how much work is done by a system over a period of time; it measures the productivity of the system. In an online transaction processing system, transactions per second is a throughput index. Response time is defined as the length of time that elapsed between submission of an input and receipt of the first character of output in an online system. Turnaround ...
Answer updated on: 12 Feb 2020
A. An application-level gateway An application-level gateway is the best way to protect against hacking because it can define with detail rules that describe the type of user or connection that is or is not permitted. It analyzes in detail each package, not only in layers one through four of the OSI model but also layers five through seven, which means that it reviews the commands of each ...
Answer updated on: 12 Feb 2020
B. The service level agreement (SLA) A service level agreement provides the basis for an adequate assessment of the degree to which the provider is meeting the level of agreed service. Choices A, C and D would not be the basis for an independent evaluation of the service.
No any questions is under moderation!
Following
You are following 0 people.
Followers
You have 0 followers.
Rank
1st
RankAlfred Hook
139
Asked134
Answered37635
Total Points
2nd
RankOrion Thames
150
Asked146
Answered35233
Total Points
3rd
RankCambron Bill
148
Asked149
Answered35215
Total Points
4th
RankCatherine Halcombe
108
Asked124
Answered23036
Total Points
5th
RankSantepro
600
Asked714
Answered22559
Total Points
6th
RankGregorynaomi
15
Asked14
Answered13608
Total Points
7th
RankRN Pedia
260
Asked167
Answered10271
Total Points
8th
RankAdewumiKoju
3
Asked1
Answered9548
Total Points
9th
RankJaksiboy
24
Asked27
Answered8384
Total Points
10th
RankCripstwick
13
Asked15
Answered8226
Total Points
Load More