What is an IP address
Correct Answer:C
Which is the first step in the risk management process
Correct Answer:C
Can be considered to be a fingerprint of the file or message
Correct Answer:A
A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?
Correct Answer:C
Who should participate in creating a BCP
Correct Answer:C
Which type of fire suppression system is more friendly to electronics
Correct Answer:A