1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
4 years ago
12

Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters

should all be included on which of the following? A physical security checklist A whitelist A response plan A logical security checklist
Computers and Technology
1 answer:
nadezda [96]4 years ago
3 0

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

You might be interested in
A small program that sends itself to other computers, rather than relying on user actions, is a
PSYCHO15rus [73]

Virus.

A virus is a malicious program or script that Spreads. 

Malware, however, will not spread. 

Viruses can spread without a victim's permission because it is automated to do so. 

For example, the Melissa virus would look like a file attachment that used reverse psychology to make you open it. From there, it goes through the first 50 email contacts stored on your computer and sends the virus to them from your computer. 
8 0
3 years ago
Software ________ defines the permissions, rights, and restrictions assigned to the person who purchases a copy of software.
Lesechka [4]
The answer to this question would be "Licensing"
3 0
3 years ago
A(n) ________________ is a software tool for specifying the content and format for a database report.
Alex_Xolod [135]
A report generator is a software tool for specifying the content and format for a database report. It is a program where it takes data from a database and use it in producing a file that can be understood by humans. These databases include XML stream, OpenCover, PartCover and the like.
7 0
3 years ago
Nanotechnology is a scientific area that deals with making or changing things that are incredibly _______________.
Dima020 [189]

Answer:

small

Explanation:

Nanotechnology deals with incredibly small things on the nanoscale.

3 0
3 years ago
What are the missing letters _A_TO_ ( 6 letters) a type of computer.
aliina [53]

Explanation:

its a laptop ☺️. . . . . .. . .

4 0
3 years ago
Read 2 more answers
Other questions:
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • A hard disk is divided into tracks which are further subdivided into:​
    11·1 answer
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • Which one is correct
    8·1 answer
  • What happens when two computers have the same IP address?
    13·1 answer
  • Which tool will select the lines of a sketch in digital software?
    7·1 answer
  • Can someone write me a design brief about a stadium​
    12·2 answers
  • Which term means a cryptography mechanism that hides secret communications within various forms of data?.
    6·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • What is being done to reduce the python population in florida?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!