1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
4 years ago
8

Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete

rrent
Computers and Technology
1 answer:
Mrac [35]4 years ago
7 0

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

You might be interested in
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically lo
slamgirl [31]

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

4 0
3 years ago
What are the different components of the cloud architecture?
sashaice [31]

Cloud computing architecture can be described as components and subcomponents required for cloud computing. Typically, these components consist of front (fat client, mobile device, thin client) and black end platforms (storage, servers), a cloud based delivery, and a network (Internet, Internet, Cloud). When all of these components are combined, they make up a cloud architecture.

3 0
3 years ago
After a group sets a project schedule, members should be prepared to
Roman55 [17]

After a group sets a project schedule, members should be prepared to complete a study-time survey to prove they can do the work.

<h3>What is a group project?</h3>

A group project is a project in which more than one person work together. Group projects are given to improve the work, as various minds can bring out various implements for the project.

Thus, the correct option is D. complete a study-time survey to prove they can do the work.

Learn more about group project

brainly.com/question/14488746

#SPJ1

3 0
3 years ago
Analog signals consists of individual electric pulses that represents bits group together into bytes {True/False}
Maru [420]

Answer:

The answer would be true

Explanation:

Hope this helps. Please mark me Brainliest

6 0
4 years ago
When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
Harman [31]
Code sofware your welcome
8 0
3 years ago
Other questions:
  • How many shared keys are required for a company of 70 employees who all need to communicate securely with each other?
    13·1 answer
  • How to create a function, called separate_int_and_str, which takes in a list and separates out the integer values and strings in
    9·1 answer
  • what important technology has done the most to allow small businesses a change to compete with larger international companies?
    5·1 answer
  • What does an operating system do?
    11·2 answers
  • The sum of the elements of an integer-valued array recursively calculated as follows: The sum of an array of size 0 is 0; Otherw
    15·1 answer
  • "You are working on a Debian distribution of Linux. You need to install a package, but you do not want to manually install all t
    8·1 answer
  • This is a while loop question for Information technology.
    11·1 answer
  • Write a program that uses a stack to test input strings to determine whether they are palindromes. A palindrome is a sequence of
    7·1 answer
  • 22. (a) List two arithmetic
    7·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!