Which of the following is not used to identify a user to control access to a building, room, or computer system?
a) active tags
b) digital signatures
c) biometrics
d) none of these
A company that wished to continuation of services in the event of fires or floods should make sure to develop……
a) security audit
b) disaster recovery
c) computer recovery plan
d) loss recovery plan
The main problem for a computer installation after a disaster is generally…
a) loss of data
b) loss of hardware
c) equipment replacement
d) none of these
What does ISP stand for?
a) information set process
b) internet service provider
c) information service provider
d) internet set process
A file with a record of activity is called…
a) cookie file
b) active file
c) cold file
d) none of these
Which of the following may result in data loss?
a) machine failure
b) software bug
c) power fluctuations
d) all of these