1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
11

An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne

rability C. adversary D. risk
Computers and Technology
1 answer:
ozzi3 years ago
8 0

Answer:A) Countmeasure

Explanation: Countermeasure is the activity that is used for the reduction or avoidance of the threats or malfunction that occur in the operating system.The tool consists of the major components like firewalls , antiviruses etc to secure the system. It protects the servers, data systems , networks etc.

Other options are incorrect because vulnerability is the capability of a system being in exposed situation, adversary is a conflict situation and risk is the event that can cause loss in the operating system.Thus , the correct option is option(A) for checking the authorization of the individual and then only letting him access the network.

You might be interested in
Jennifer has written a business report. What should be her last step before she submits the story for publication?
Montano1993 [528]
Revising and editing because it makes the report look sharp and business like.
5 0
3 years ago
Read 2 more answers
Assume that the array arr has been declared . Write a statement that assigns the next to last element of the array to the variab
iris [78.8K]

Answer:

x=arr[arr.length-2]; is the correct answer for the given question.  

Explanation:

In the above statement firstly we calculate the length of the given array.The arr.length function is used to calculate the array length.As mention in the question we have to assign the next to last element of the array to the variable x, so we used arr[arr.length-2] and finally, we assign them to the variable x.

so the final statement is x=arr[arr.length-2];

6 0
3 years ago
How was the addition of
lozanna [386]

Answer:

How was the addition of an improvement over early web design? Webpages could finally incorporate tables into the design

6 0
2 years ago
Explain how devices on a lan access resources in a small to medium-sized business network.
Mkey [24]

Solution:

Switches are a fundamental part of most networks. They let multiple users communicate directly with each other. As such, they offer the potential for collision-free, high-speed networking. In essence, switches create a system of simultaneous, parallel, point-to-point connections between pairs of devices

The benefits of the lan network that can be realized by using LAN switches are as follows:

• Increased network scalability—The network can expand easily as the business grows.

• Improved bandwidth performance for each network user—This is important in environments where users operate multimedia applications or conduct frequent client/server database interactions.

• Multiple simultaneous connections—Many simultaneous data transfers can take place between pairs of devices connected to switch ports. This is not possible with hub-based networks.

• Reduced congestion and information transmission delay—This translates to more efficient business application access. Remember that network segmentation is used to minimize the number of users contending for LAN bandwidth on each segment (switch port).

• No single point of failure—With proper network design, there are fewer chances for network failure.

• Improved manageability and security through the use of virtual LANs (VLANs)—VLANs group individual users into logical workgroups with common interests or business functions. Data broadcasts are restricted to designated members of the group (also called the broadcast domain). This functionality gives companies the flexibility to move employees around physically yet still maintain their functional ties via the VLAN without network reconfiguration.

This is the required answer.

7 0
2 years ago
Tracking your spending can help you
Dimas [21]
It can help you become more aware of what you are spending and where you are spending it. That can help you identify the areas where you need to make changes.
3 0
2 years ago
Other questions:
  • Which of the following statements is false?
    10·1 answer
  • The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
    5·1 answer
  • What is a single-user computer?
    8·1 answer
  • 13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
    11·1 answer
  • You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while
    14·1 answer
  • Add code to this loop, to pick up all of the radios, with only seven blocks.
    13·1 answer
  • Who is big brain me or you
    14·1 answer
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
  • Choose the missing term.
    14·1 answer
  • I will give brainyest
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!