1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
2 years ago
10

Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic se

curity settings that should apply to all systems. What type of document should she create
Computers and Technology
1 answer:
larisa86 [58]2 years ago
3 0

The type of document should she create is  baseline document. Check more about the term Baseline below.

<h3>What is a Baseline document?</h3>

A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.

Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is  baseline document.

Learn more about Windows servers  from

brainly.com/question/14526761

#SJ1

You might be interested in
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Why does my Chromebook keep on turning my new tabs into clever tabs?
Alina [70]

Answer:

Ok, so it's not letting me submit a text response, so I'll attach an image of my answer.

Explanation:

6 0
2 years ago
Read 2 more answers
How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
Anastasy [175]

Answer:

A. Treaties

Explanation:

Based on the information provided within the question it can be said that in this type of situation where both countries are affected they usually enter into a treaty. This treaty represents an agreement between both countries on how they are going to handle the situation so that both countries get the justice that they want and therefore mutually benefit.

4 0
3 years ago
Propane also known as LP gas, is often mixed with about _______ percent of other gases, such as butane, propylene, and mercaptan
vitfil [10]

Answer:

30

Explanation:

Java - Using a method, how do I "write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. Your program must define and call the following method that returns the number of times the input character appears in the input string.

public static int countCharacters(char userChar, String userString)"

4 0
4 years ago
Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
Firdavs [7]
C. The color of the shot...
7 0
4 years ago
Other questions:
  • Describe the difference between gui and cli​
    9·1 answer
  • Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more
    8·2 answers
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • When designing a database, what should your first step be?
    5·1 answer
  • Write one paragraph: Do you feel comfortable giving out personal information online? Why or why not? Is there a limit to what yo
    8·1 answer
  • Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the pac
    10·1 answer
  • What are the different types of firewalls? Which one is best?
    5·1 answer
  • In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
    15·1 answer
  • What type of computer system can be found in the computer lab at school?
    14·1 answer
  • COMO DEFINES LAS PALABRAS COMPUTADOR Y DISPOSITIVO? MENCIONA EJEMPLOS
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!