1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
8

Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete

rrent
Computers and Technology
1 answer:
Mrac [35]3 years ago
7 0

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

You might be interested in
Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
Vikki [24]

A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

<h3>What is Enriching Your Data?</h3>

Data enrichment is known to be a kind of an augmentation and it is seen as the act or the process of making better an existing information by the use of a  supplementing missing or any kind of incomplete data.

<h3> What is a Lookup?</h3>

Data Lookup is known to be the method used to make plenty any information based on rules.

Hence, A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

Learn more about SPLUNK from

brainly.com/question/26470051

#SPJ1

8 0
2 years ago
Explain why a single 500 kg block of granite weathers much more slowly than 100 chunks of granite weighing 5 kg each.
Bad White [126]
Weathering occurs on the surface of rocks, and lots of small rocks have a much greater surface area than one big rock.
3 0
3 years ago
Read 2 more answers
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
Monica [59]
<span>Keyloggers can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
</span><span>The keylogger is also called keystroke logger or system monitor. This technology used to monitor and record each keystroke typed on a specific computer's keyboard. </span>
6 0
3 years ago
What is Communication​
iVinArrow [24]
Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. ... A sending device that initiates an instruction to transmit data, instructions, or information. A communications device that connects the sending device to a communications channel.
3 0
3 years ago
What bug was supposed to start affecting computers on january 1 2000
horsena [70]

Answer: Y2K bug, also called Year 2000 bug or Millennium Bug

5 0
3 years ago
Other questions:
  • What types of scientific claims should be verified
    5·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • Jamal is creating a presentation for a report on engineers. He wants to use a template. How can he access different options for
    14·1 answer
  • You can use this type of program to create a new raster image
    9·1 answer
  • Gigantic Life Insurance is organized as a single domain. The network manager is concerned that dividing into multiple domains to
    15·1 answer
  • 4. What two important events occurred early in the formation of the universe?
    8·1 answer
  • Hey everyone. I am so bored
    14·2 answers
  • What is keyword density?
    15·2 answers
  • Which directory stores the cron configuration file?.
    8·1 answer
  • Whats the best way to make a video game?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!