1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
14

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil

ity of redundant hardware devices??
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
4 0
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
You might be interested in
What is microsoft excel​
Andrei [34K]

Answer:

A spreadsheet program included in Microsoft Office suit of application. Spreadsheets present tables of value arranged in rows and columns that can be manipulated mathematically using both basic and advanced functions.

6 0
3 years ago
Read 2 more answers
Select the best answer to the following question.
Fittoniya [83]

Answer:

I think its called "cloud computing"

8 0
3 years ago
What three best practices can help defend against social engineering attacks?
lina2011 [118]

The three best practices that can help protect against social engineering are:

  • Be watchful of instructions to click on enticing web links.
  • Educate employees regarding policies.
  • Avoid disclosing your login details.
<h3>Social engineering</h3>

This refers to online crimes that are socially engineered or designed to trick victims into providing certain information or carrying out certain actions that would cause unknown harm to them or others.

For example, they may be tricked into revealing their security information or other personal information via email correspondence.

You can learn more about social engineering here brainly.com/question/26072214

#SPJ12

6 0
2 years ago
Use the code below to answer the following questions. Note that the catch statements in the code are not implemented, but you wi
anzhelika [568]

Answer:

d) either e1 or e5

Explanation:

Here, the instruction i1 goes ahead in trying to open the given file through an input stream buffer reader. If the given file name is wrong, it will indicate that an e1 file is not found or if any other IO errors due to invalid stream, no disc in drive e5 IO exception will be drawn.

4 0
3 years ago
What year did apple computer introduce the first ipod?.
Lady bird [3.3K]
Apple first released the first ipod in 2001
8 0
2 years ago
Other questions:
  • By default, a word document generally displays in ____ view.
    9·1 answer
  • To use an imported image, simply drag it from the desktop onto the stage. true or false?
    14·1 answer
  • Please write a Java program.
    8·1 answer
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • Which of the following information should be included in audit documentation? a. Procedures performed. b. Audit evidence examine
    13·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • 2.8 Code Practice: Question 2
    11·1 answer
  • The components of hardware include:
    6·2 answers
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
  • You can put ______ on your phone.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!