1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
15

Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;

she’s concerned about file system security. Which Microsoft feature would be most helpful to implement security to the file systems?
Computers and Technology
1 answer:
Mariulka [41]3 years ago
3 0

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

You might be interested in
A security operation center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices
masya89 [10]

A type of virus that influences this circumstance in the network bandwidth is a worm.

<h3>What is Virus in technology?</h3>

In computers and technology, viruses may be characterized as a sort of malicious software, or malware, that extends between computers and provokes a deterioration of data and software either partially or completely.

The complete question is as follows:

  • A micro virus
  • a multipartite virus
  • A worm
  • a program virus.

Worms are memory-resident viruses that duplicate over the network resources. The primary consequence of this type of virus is to rapidly eradicate network bandwidth with its duplication.

This virus may also be competent to accomplish a Denial of services invasion by slamming O.S and servers.

Therefore, the correct option for this question is C, i.e. a worm.

To learn more about Computer viruses, refer to the link:

brainly.com/question/26128220

#SPJ1

5 0
2 years ago
A(n) ____ is a collection of one or more program statements combined to perform some action
finlep [7]

The answer is Method

A method is a code block of statements that perform a task. By calling a method, a program causes statements to be executed. In C# programming, every instruction that is executed is performed in the context of a method. Technically, it is how behaviors are implemented in C# and are enclosed in parentheses separated by commas






3 0
3 years ago
Q.No.3 b. (Marks 3)
Vilka [71]

Answer:

The change in complex systems can be explained according to the relationship of the environment where the system is implemented.

The system environment is dynamic, which consequently leads to adaptation to the system, which generates new requirements inherent to changes in business objectives and policies. Therefore, changing systems is necessary for tuning and usefulness so that the system correctly supports business requirements.

An example is the registration of the justification of the requirements, which is a process activity that supports changes in the system so that the reason for including a requirement is understood, which helps in future changes

Explanation:

7 0
3 years ago
Which of the following correctly identifies a voltage source and its method of developing electric potential?
Semenov [28]
Dry cell- Chemical action
8 0
3 years ago
Read 2 more answers
Which of the following is normally mutually exclusive<br> Read only files<br> Printer<br> WIFI
marin [14]

Answer:

the answer is going to be printer

5 0
2 years ago
Other questions:
  • Instructions:Select the correct answer.
    15·2 answers
  • Write a full class definition for a class named Counter, and containing the following members:________
    9·1 answer
  • To speed up the display of graphics, a(n) ________ is integrated into some video cards. select one:
    12·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • Explain information technology ?
    10·1 answer
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
  • A menu that appears when an object is clicked with the right mouse button is called a tool-tip help menu
    10·1 answer
  • Compare and discuss between electromechanical and electronic era of computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!