1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
9

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structur

e, data flowing across the network, network protocols used, or packet header values. A. availability B. integrity C. confidentiality D. authentication
Computers and Technology
2 answers:
4vir4ik [10]3 years ago
8 0

Answer:

C. confidentiality

Explanation:

Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.

Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.

Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.

ratelena [41]3 years ago
5 0

Answer: C. Confidentiality

Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.

With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.

You might be interested in
An automated search feature used by search engines to find that match your search terms is called a spider or
9966 [12]

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


5 0
3 years ago
Read 2 more answers
Which of the following is not a characteristic of a good value log entry
Stolb23 [73]
What are we supposed to find? Help us
6 0
2 years ago
When you examine a computer chip under a microscope, what will you see?
ELEN [110]
<span>When you examine a computer chip under a microscope,  you will see </span>integrated circuits.
5 0
3 years ago
Which of the following is true of how packets are sent through the Internet?
klemol [59]

Packet metadata is used to route and reassemble information travelling through the Internet

-scav

5 0
3 years ago
A city engineer is tasked with studying vehicular traffic patterns throughout a large metropolitan area. He designs a number of
kvasek [131]

Answer:

The correct answer is "The counter is not capable of counting hundreds of cars without exceeding the limit of the five bits of storage"

Explanation:

It is obvious the engineer did not envisage that the number of cars that will be collected in the daily data would not be so much into the hundreds and so uses a storage of 5-bit value. Hence it makes it impossible for the counter to count hundreds of car and save to the central saver since it sill definitely exceed the limit of the five bits of storage available to the central server.

8 0
3 years ago
Other questions:
  • What does the proofreading mark "..." mean?
    14·2 answers
  • How many owners does a sole proprietorship have?
    13·1 answer
  • Which type of communication protocol converts data into standard formats that can be used by applications?
    11·1 answer
  • The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles t
    15·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • The best way to ensure the accuracy and safety of your accounts is to:
    10·1 answer
  • Jaboooo helloooo are u there
    13·2 answers
  • Help brainleist giving exam
    15·1 answer
  • Describe any five Morden application areas of computer​
    9·1 answer
  • A pseudo code that asks the user for their forename and their surname , and then outputs both, separated by a space to the user​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!