1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
11

An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne

rability C. adversary D. risk
Computers and Technology
1 answer:
ozzi3 years ago
8 0

Answer:A) Countmeasure

Explanation: Countermeasure is the activity that is used for the reduction or avoidance of the threats or malfunction that occur in the operating system.The tool consists of the major components like firewalls , antiviruses etc to secure the system. It protects the servers, data systems , networks etc.

Other options are incorrect because vulnerability is the capability of a system being in exposed situation, adversary is a conflict situation and risk is the event that can cause loss in the operating system.Thus , the correct option is option(A) for checking the authorization of the individual and then only letting him access the network.

You might be interested in
Plz go sub 2 "Shyy096" he is a 11 y/o boy and makes music fortnite vids, it would rly help him if u subscribe cuz he only has 8.
Pachacha [2.7K]

Answer:

OKK

Explanation:

5 0
3 years ago
Traceability of requirements is helpful in the followingexcept
larisa86 [58]

Answer: D)  Identifying GUI's for a particular requirement

Explanation:

 Traceability of requirements is helpful except identifying GUI's for a particular requirements as, traceability in project management describe the relationships between two or more element throughout in the development process and outline the relationship between the customer requirement by traceability matrix. And the requirement of traceability is so important because it creating a downstream flow of software and test cases in software requirement but not helpful in GUI identification.

6 0
4 years ago
Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
enot [183]

use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".



Example:

<a href="#Sisters">Click Here!</a>

then you can add this somewhere on the document.

<section id="Sisters">Hello World!</section>

7 0
3 years ago
Alexander studies sitting on the edge of his bed with his laptop on his lap. he complains of a sore neck. how can he best improv
kumpel [21]

The way in which Alexander can best improve his study area is that: D. he can put his computer on a desk and sit in a comfortable chair.

<h3>What is a laptop?</h3>

A laptop can be defined as a small, portable type of computer that is designed and developed by embedding both a mousepad and keyboard on it.

Also, it is usually light enough to be placed on an end user's lap while he or she is working.

In this scenario, the way in which Alexander can best improve his study area is that he can put his computer on a desk and sit in a comfortable chair.

Read more on a laptop here: brainly.com/question/26021194

#SPJ4

7 0
2 years ago
Which of the following statements about federal student loans is true?
never [62]
The correct answer is a.<span>) the interest rate on your loan will be fixed over time. 
</span>
7 0
4 years ago
Other questions:
  • HEY DO U LIKE TRAINS!
    7·1 answer
  • Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
    15·2 answers
  • Which is a function of network media?
    11·2 answers
  • Match the academic requirements with the careers. Technical program , bachelors degree, doctorate degree can go with cosmetologi
    7·2 answers
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    10·1 answer
  • Anyone wanna play among us UwU code is TAEQPQ
    15·2 answers
  • Explain why the intangibility of Software System poses special problems for Software Project Management
    11·1 answer
  • Write a program that repeatedly shows the user a menu to select the shape form three main shapes or to print the shapes created
    15·1 answer
  • Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to alm
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!