1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
4 years ago
12

Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters

should all be included on which of the following? A physical security checklist A whitelist A response plan A logical security checklist
Computers and Technology
1 answer:
nadezda [96]4 years ago
3 0

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

You might be interested in
You hear someone make the following comment: "A blueprint is a design for a house. A carpenter can use the blueprint to build th
max2010maxim [7]

Answer:

The answer is "classes are the blueprints"

Explanation:

According to the class definition, it is a collection of data members and member methods, in which all the data members can't return any value, and member methods or functions return a value.

  • In this question, the carpenter uses the blueprint to build the house, if he uses class and object model.
  • This model also known as an entity blueprint, which sets the properties and functions with an object type.
4 0
4 years ago
Write a program to read a sentence which is a single string. Then count the number of words in the sentence. The program will re
patriot [66]

Answer:

The program in Python is as follows:

sentence = input("Sentence: ")

words = len(sentence.split())

print("Words:", words)

Explanation:

This reads the sentence for the user

sentence = input("Sentence: ")

This counts the number of words

words = len(sentence.split())

This prints the number of words

print("Words:", words)

6 0
3 years ago
Can someone help me with these two
Digiron [165]

upper question:

false

lower question:

25

26

-10

7 0
3 years ago
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 < 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
4 years ago
While many myths are harmless, why can myths themselves be dangerous?
blondinia [14]

Answer:b

Explanation:

7 0
4 years ago
Other questions:
  • What is constructive criticism?
    5·1 answer
  • A contractor is preparing a bid to install swimming pools at a new housing addition. The estimated time to build the first pool
    12·1 answer
  • Which two of the following skills are important for a meteorologist
    12·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?
    12·1 answer
  • A company operates on two types of servers: 2 large servers (L) and 4 smaller servers (S), with a combined total of 64GB RAM. Th
    9·1 answer
  • The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
    15·1 answer
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
  • You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the b
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!