1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
1 year ago
14

What action should you take if you become aware that sensitive compartmented information has been compromised

Computers and Technology
1 answer:
irina [24]1 year ago
5 0

The sensitive compartmented information can not be compromised and in case found with the incident it must be reported to the security officer.

<h3>What is Sensitive Compartmented Information?</h3>

The sensitive compartmented information is given as the sensitive information to the United States gathered with the source of the intelligence and the analytical process.

The information has been sensitive and was considered not to be compromised. In case the information is found to be compromised, the security officer of the information must be contacted to check into the details.

Learn more about sensitive information, here:

brainly.com/question/25948574

#SPJ1

You might be interested in
Amy adds 16 GB of storage to her smartphone.
tatyana61 [14]
For every 1 gigabyte equals 1000 megabytes. Therefor Amy can store 8000 pictures on her smartphone.

1 GB to 1000 MB
16 GB to 16000 MB
File size 2 MB
16000 MB divided by 2 MB = 8000 MB
8 0
3 years ago
Descriptive information (e.g., title, author, subjects covered, location as a webpage) about an information resource in an infor
Stella [2.4K]

Answer:

A) Metadata

Explanation:

Metadata is information about data. call it data about data if you like and it could be descriptive, structural, statistical or administrative, the aim is to provide further information about a particular data element for example in descriptive meta data which is useful for discovery and identification as it provides futher information such as title, keywords, authur and abstract.

4 0
2 years ago
What is the term for a web site and network used only by employees within a company?
slega [8]
Local area network is the term
5 0
3 years ago
List any ten keyboard symbols.​
Nostrana [21]

Answer:

Esc- Esc (escape) key.

F1 - F12 What are the F1 through F12 keys?

F13 - F24 Information about the F13 through F24 keyboard keys.

Tab Tab key.

Caps lock- Caps lock key.

Shift- Shift key.

Ctrl - Control key.

Fn- Function key.

Alt- Alternate key (PC only; Mac users have an Option key).

Spacebar- Spacebar key.

Hope this helps, have a great day/night, and stay safe!

3 0
2 years ago
Server 2016 is compatible for Powershell 5.0 State True or False.
Svetllana [295]

Answer:

True

Explanation:

Powershell is a command line administrative tool which ships with Windows. It is heavily integrated with the dotNET framework.

Powershell 5.0 is compatible with Windows 2016 however by default Windows 2016 comes with next higher version , namely 5.1 .

Powershell 5.0 is also compatible with Windows Server 2019, Windows Server 2012, Windows Server 2008 R2 SP1 , Windows 10, Windows 8.1 and Windows 7.

8 0
2 years ago
Other questions:
  • What does cro stand for?
    7·2 answers
  • As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
    9·1 answer
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • PLS HELP!! 50 Points! Will mark correct answer brainliest!!
    11·2 answers
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
    10·1 answer
  • How did New York Governor Hugh Carey handle Sostre’s situation?
    9·2 answers
  • Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
    13·1 answer
  • Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following
    12·1 answer
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!