1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
12

Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters

should all be included on which of the following? A physical security checklist A whitelist A response plan A logical security checklist
Computers and Technology
1 answer:
nadezda [96]3 years ago
3 0

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

You might be interested in
What is your F O R T N I T E name
kolbaska11 [484]

Answer:

don't have name, but would be something cool.

Explanation:

poor, have a splendid day.

6 0
2 years ago
Read 2 more answers
What type of microscope requires a nonmetal sample to be prepared for viewing by coating it with a thin layer of a conductive ma
zheka24 [161]

The answer is a Scanning Electron Microscope

It is important to obtain and prepare proper samples when using SEM. The sample’s size, state, and shape are things that should be considered before the sample preparation. Some samples need to be coated. Most metals require no preparation since they can easily conduct electricity. Non-metals, however, needs to be coated with a thin layer of gold. Gold is the ideal non-metal and works most of the times.

5 0
3 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
2 years ago
A microwave is the only electric device in a 120-volt circuit. If the circuit has 7. 5 amps of current, what is the electric pow
sergij07 [2.7K]

The only electric appliance in a 120-volt circuit is a microwave. If the circuit has a 7. 5 amp current, the microwave's electric output is 900 watts.

<h3>Explain about the microwave's electric output?</h3>

As was previously said, 1000W is the most common microwave wattage . The real power usage of a 1000W microwave, or its average input wattage, is 1402.7W. In a microwave, it is always more important to pay attention to the input wattage than the output wattage.

The energy that can be used in a microwave to heat and cook food is represented by this number. Typically, the power output is expressed in Watts, for example, 900 Watts. The appliance's whole wattage consumption used to produce microwave energy is the input.

A microwave can consume anywhere from 600 to 1,000 watts (W) of power. When connected to a 120-volt outlet, microwaves draw roughly 10 amps. The largest influence on how much electricity your microwave uses over time is how frequently you use it.

To learn more about microwave's electric output refer to:

brainly.com/question/13943474

#SPJ4

4 0
1 year ago
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the
STatiana [176]

Answer:

Explanation:

These are the three diffrent levels listed below;

1) NSP (National Service Provider)

2) RSP (Regional Service Provider)

3) ISP (Internet Service Provider)

4 0
3 years ago
Other questions:
  • What are a few benefits of virtualization?<br> How do they benefit ?
    9·1 answer
  • The ability to memorize well is an example of
    6·2 answers
  • According to COSO, which of the following components addresses the need to respond in an organized manner to significant changes
    14·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
    15·1 answer
  • CAD workstations
    11·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
    10·1 answer
  • Does coaxial cable use radio waves to transmit data
    10·2 answers
  • Select the correct answer from the drop-down menu.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!