1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
11

An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne

rability C. adversary D. risk
Computers and Technology
1 answer:
ozzi3 years ago
8 0

Answer:A) Countmeasure

Explanation: Countermeasure is the activity that is used for the reduction or avoidance of the threats or malfunction that occur in the operating system.The tool consists of the major components like firewalls , antiviruses etc to secure the system. It protects the servers, data systems , networks etc.

Other options are incorrect because vulnerability is the capability of a system being in exposed situation, adversary is a conflict situation and risk is the event that can cause loss in the operating system.Thus , the correct option is option(A) for checking the authorization of the individual and then only letting him access the network.

You might be interested in
If the user enters 26 what is output? _____________
MArishka [77]

Please write the whole question, is it asking for the function that requests user input?

3 0
3 years ago
Location of a video or photoshoot is not important when it comes to preplanning the shoot
faust18 [17]

Answer: Location of a video or photoshoot is not important when it comes to preplanning the shoot. 2. Booms are large adjustable poles to mount microphones.

3 0
3 years ago
Write a program that reads in a text file, infile.txt, and prints out all the lines in the file to the screen until it encounter
ivanzaharov [21]

Answer:

Explanation:

f=open("infile.txt","r")

flag=True

while(flag):

s=f.readline().strip()

if(len(s)>=4):

print(s)

else:

flag=False

8 0
3 years ago
PLZ HELP QUICK! WORTH 25 POINTS!
LenKa [72]

Functions can have numeric parameters.

Functions can have string parameters.

Functions can have many parameters.

Functions can have no parameters.

I hope this helps!

6 0
3 years ago
Read 2 more answers
the mail merge feature can be used to address the same letter to several different people , true or false
sergij07 [2.7K]
The answer is that it is true.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Andy uses a dial-up modem to connect to the Internet. He usually browses news sites, but he notices that online video takes a lo
    15·1 answer
  • Which command on the page layout ribbon enables a user to mark where a new page will begin on the printed copy?
    6·1 answer
  • ____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.
    14·1 answer
  • Bitlocker uses the computer's __________ chip to store encryption keys and does not rely on individual user credentials. securit
    10·1 answer
  • Each of the major DBMS products changes quite rapidly, and keeping DBMS software up-to-date can be a difficult task. As a DBA, w
    14·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    15·1 answer
  • What output is produced by the following code? Integer first = new Integer(7); Integer second = first; if (first == second) Syst
    15·1 answer
  • Can you log into your account with another phone​
    5·2 answers
  • Which of the following statements is FALSE?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!