1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
4 years ago
9

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structur

e, data flowing across the network, network protocols used, or packet header values. A. availability B. integrity C. confidentiality D. authentication
Computers and Technology
2 answers:
4vir4ik [10]4 years ago
8 0

Answer:

C. confidentiality

Explanation:

Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.

Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.

Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.

ratelena [41]4 years ago
5 0

Answer: C. Confidentiality

Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.

With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.

You might be interested in
What is the difference between Sleep and Shut Down?
OleMash [197]

Answer:

When you shut down your PC, all your open programs close and the PC shuts down your operating system. but In sleep mode, the PC enters a low-power state. The PC's state is kept in memory, but other parts of the PC are shut down and won't use any power.

Explanation:

3 0
3 years ago
What is the function of a bread crumb trial in a website
joja [24]

Answer:

A “breadcrumb” (or “breadcrumb trail”) is a type of secondary navigation scheme that reveals the user's location in a website or Web application. The term comes from the Hansel and Gretel fairy tale in which the two title children drop breadcrumbs to form a trail back to their home.

Explanation:

A breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites. Breadcrumbs make it easier for users to navigate a website – and they encourage users to browse other sections of the site. ... You head to their site and end up on The Nestle company history page. Using their breadcrumbs, you can easily navigate back to About Us, History, or even their home page.

6 0
3 years ago
A computer cannot store the data and information for your future use true or false​
baherus [9]
The answer would be false
8 0
3 years ago
How many errors are in the following formula?
finlep [7]

there are about two errors in the formula


4 0
3 years ago
Davingould1115...................answer 1​
erma4kov [3.2K]

wt ...

I didn't get u..

is it a I'd

8 0
3 years ago
Read 2 more answers
Other questions:
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • Match the file extensions to the file types. Some file types may be used more than once.
    11·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • My computer just fried anybody know why it did that?
    14·2 answers
  • What does a codec do? Choose all that apply.
    5·2 answers
  • JAVA
    12·1 answer
  • Big data are used to _____. Select 3 options.
    5·1 answer
  • A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook
    15·1 answer
  • An Inspect and Adapt (I&A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!