1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
6

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine

ss needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
6 0

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

You might be interested in
What is the target audience of an ad?
GuDViN [60]

All ages

Explanation:

It is a toothpaste advert which most people use. It will also appeal to people who want to get whiter teeth

8 0
3 years ago
Factors to consider while selecting a software to use​
luda_lava [24]
You need to consider what exactly you will be using the software for, there are many different softwares and they all have different purposes.
6 0
2 years ago
Which tools is used to bundle cables neatly inside and outside of a computer?​
Ugo [173]

Answer:

Cable Ties

Explanation:

6 0
3 years ago
What type of device is the printer?
ICE Princess25 [194]

B,the printer only receives signals from the computer and prints them.

4 0
3 years ago
Read 2 more answers
BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
Alborosie

Answer:

im lost tell me a question then ill answer

Explanation:

4 0
3 years ago
Other questions:
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • time to throw poggers xqc time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw pogchamp time to th
    5·2 answers
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • Choose the response that best completes the following statement.
    14·2 answers
  • PLEASE HELP. Nobody has been helping me, i need to resolve this code issue for game design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!