1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
9

You have users who connect to the corporate network using their laptops. because these computers often access confidential data,

you need to be sure that users access network resources only from computers that comply with the company policy of having an anti-virus, anti-spyware and have the newest windows updates. you decide to use nap. which type of enforcement policy should you implement
Computers and Technology
1 answer:
Triss [41]3 years ago
7 0
<span>You implement NAP Enforcement for 802.1X</span>
You might be interested in
PLEASE HELP ILL GIVE POINTD AND BRAINLIEST
Nastasia [14]

Answer:

I would have to say C.

Explanation:

Feel free to correct me if i'm wrong :)

Hope this helps

4 0
3 years ago
What does flexibility look like within your learning? Relevancy of Flexibility: Why is this important to your students?
Yakvenalex [24]

Answer:

just look like I they legs and hope they don't pop off

7 0
3 years ago
alex needs to email his graduation certificate to a prospective employer. he has only physical copies of the certificate. what d
svlad2 [7]
He should use a scanner, which would convert an image into an electronic file.
7 0
2 years ago
Please can someone help my assignment.​
sweet [91]

Answer:

my hero academia fan!!!!!!

5 0
3 years ago
Give example of a biometric authentication device​
seropon [69]

Finger Print Scanner, Spit Sample, Face ID

7 0
3 years ago
Other questions:
  • What can web designers use to control the individual web page layouts for all of the pages on a website?
    7·1 answer
  • What can you do to stop a computer from repeatedly restarting in a continuous loop?
    13·1 answer
  • What is data anayltics
    5·1 answer
  • Which type of link is normally used to interconnect two peripheral modules (pm) in the digital multiplex system (dms)?
    13·1 answer
  • Do rats smell good? what do you think
    8·2 answers
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
    13·1 answer
  • Who is credited with writing Google's famous page ranking search algorithm?
    13·1 answer
  • I NEED HELP SOMEONE HELP ME PLEASE
    10·1 answer
  • You already know how to use lists. What is the index of 5 in the following list?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!