1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
7

A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac

hing data integrity. Which technology would help the manager look into the activities of the team member?

Computers and Technology
2 answers:
Slav-nsk [51]3 years ago
5 0
The last one! its going to be e
kogti [31]3 years ago
5 0

The answer is computer forensics  

Digital computer forensics teams are experts who can help unravel and put together any evidence and come into terms with a scope of a breach. Computer Forensics technology use various investigations and analysis techniques to gather and preserve evidence. Such evidence, if found, will be presented in a court of law if the manager finds one of his team members culpable.  

You might be interested in
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Alja [10]

Answer:

B. Change the router's default administrative password.

Explanation:

Whenever a user purchase a router for wireless network, a default password has been set for the device, which can be easily accessible to different users on the internet or that particular network. This will  lead to unsecured that particular user in terms of hacking or stealing data or personnel information easily.

To make sure the security of customer on private network, the technician should change the router default password.  

7 0
3 years ago
Feedback is one of the basic elements games have in common<br><br> True<br> False
mixas84 [53]
True because odds of finds any game with no feedback is unheard of
7 0
3 years ago
Read 2 more answers
The seven basic internal components found in a computer tower
Minchanka [31]
Motherboard, CPU, RAM, PSU, HDDs, GPU, and a Sound card.
8 0
4 years ago
Please help!
MaRussiya [10]
Use Easybib.com for your citations. All you have to do is type the name of your sources in to "easybib" and choose if it is a book or a website, then copy it on to a word document.

I hope you can understand this and it helps!!
4 0
3 years ago
When inserting a fly in animation what is the first step in the process?
marishachu [46]

Answer:

The answer: select the element you wish to animate.

Explanation:

4 0
3 years ago
Other questions:
  • Network signaling is a function of which layer of the osi model
    10·1 answer
  • How is technology closely linked to creativity
    15·1 answer
  • You can tell a cell is the active cell when it has a
    14·2 answers
  • A golf ball is at rest on the grass. What must happen to cause the ball to move?
    5·1 answer
  • You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web applica
    7·1 answer
  • Cloud suites are stored on your hard drive and are available anywhere you can access the Internet
    15·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
    12·1 answer
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • What do people in the movie e.t think about the character E.T
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!