1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
11

An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne

rability C. adversary D. risk
Computers and Technology
1 answer:
ozzi3 years ago
8 0

Answer:A) Countmeasure

Explanation: Countermeasure is the activity that is used for the reduction or avoidance of the threats or malfunction that occur in the operating system.The tool consists of the major components like firewalls , antiviruses etc to secure the system. It protects the servers, data systems , networks etc.

Other options are incorrect because vulnerability is the capability of a system being in exposed situation, adversary is a conflict situation and risk is the event that can cause loss in the operating system.Thus , the correct option is option(A) for checking the authorization of the individual and then only letting him access the network.

You might be interested in
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembli
andrew11 [14]

Answer:

TCP

Explanation:

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.

4 0
3 years ago
Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file trans
Vika [28.1K]

Answer:

UDP Port 69

<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>

Explanation:

UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.

3 0
3 years ago
In what ways can information be slanted in a news report? List at least five ways.
Sedbober [7]

Answer:

author, journalist and speaker/media trainer this is all I know so

author, journalist and speaker/media trainer

6 0
3 years ago
Read 2 more answers
What does the term hardware refer to?
Jobisdone [24]

Answer:

The physical components that a computer is made of

Explanation:

as u can see these components and u can repaire these components if they got damaged

6 0
3 years ago
Hi guts gyt edgsahgflefljwegfwygafbhdshdnvcashD
lapo4ka [179]

Hello, how are you and welcome!

4 0
3 years ago
Other questions:
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • The answer for this question?
    14·1 answer
  • When using the boolean data type, we encapsulate the data in what symbol?
    11·2 answers
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    7·1 answer
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    12·2 answers
  • What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request
    15·1 answer
  • What are the steps to customize a slide show?
    10·2 answers
  • What is the difference between PowerPoint and Outlook?
    5·1 answer
  • How would you want to change the copyright laws?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!