1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
9

Which of the following refers to a failure response resulting in open and unrestricted access or communication?

Computers and Technology
1 answer:
avanturin [10]3 years ago
6 0

Answer:A)Fail-open

Explanation:After opening ,accessing any operation or function in system or communicating through a network ,results in the failure by factor of not being able to be accessed is known as fail-open.The unrestricted access can occur due to several reason like network issue, origin problem etc.

Other options in the given question are incorrect because mission critical ,default flow and fail secure are not the situations that occur when after opening, access gets restricted. Thus, the correct option is option(A).

You might be interested in
1. I am a rectangle in a flowchart. What do I represent?
Strike441 [17]

Answer:

Down;

1.Parallelogram

3. Start

Across;

1. process

2.diamond

4. Flowchart

5. Arrow

Explanation:

3 0
3 years ago
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchr
erastovalidia [21]

Answer:

The answer is "10101010".  

Explanation:

Description of the above question as follows:

  • Encryption with Manchester is a bit transmission method that makes synchronizing the receiver with the sender simple.
  • It splits each bit time frame into two, ensuring that the signal levels are always transient in the middle of each bit.
  • The encoding of Manchester explains the first byte of the frequency signal pattern, which produced in the preambles which are given in the attachment.

6 0
3 years ago
What is an effective technique for searching the web?
Arte-miy333 [17]
Google.com, Bing, or Dark Web engines.
7 0
4 years ago
Which of the following type of software application would open a txt file
kogti [31]
I think that it's A or C
3 0
3 years ago
Read 2 more answers
Other questions:
  • In 2-5 paragraphs, describe the points that Kendra needs to consider when choosing a telecommunications technology to meet her n
    6·1 answer
  • What is an example of asynchronous communication
    7·1 answer
  • What will the following code display? #include using namespace std; void doSomething(int); int main() { int x{2}; cout <<
    9·1 answer
  • When using IPsec, how can you ensure that each computer uses its own private key pair?
    12·1 answer
  • What formula would you enter to add the values in cells b4, b5, and b6?
    10·1 answer
  • PowerPoint:
    7·2 answers
  • Is a processor is be the same speed as the chips on the motherboard??​
    12·2 answers
  • What are some example of popular music for teenagers
    8·2 answers
  • What is the function of the operating system of a computer?
    14·1 answer
  • Which Operating System is used most often in households?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!