1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
9

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structur

e, data flowing across the network, network protocols used, or packet header values. A. availability B. integrity C. confidentiality D. authentication
Computers and Technology
2 answers:
4vir4ik [10]3 years ago
8 0

Answer:

C. confidentiality

Explanation:

Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.

Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.

Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.

ratelena [41]3 years ago
5 0

Answer: C. Confidentiality

Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.

With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.

You might be interested in
Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
Marina CMI [18]

Answer:

i. This value was not accepted because we have 12 months and not 13.

ii. This is because the user entered the value for the day as value for the month.

Explanation:

i. Why was this not accepted?

This value was not accepted because we have 12 months and not 13. The user entered a value that was above the maximum value registered for the number of months in a year- which is 12.

ii. Why do you think this error occurred

This is because the user entered the value for the day as value for the month.

This could be because the user uses a date system different from that of the program.

3 0
2 years ago
True or false? you should avoid using your power point slides as handouts, according to the text.
vazorg [7]
True, you should avoid using power point notes always
4 0
2 years ago
What report shows which types of mobile devices visited a website?.
Lerok [7]

Answer:

Technology > Network report. All traffic > Source/Medium report.

Explanation:

hope this helps

8 0
1 year ago
Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432
seropon [69]

Answer:

The Logitech ones.

Explanation:

Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.

6 0
3 years ago
B. Does “refactoring” mean that you modify the entire design iteratively? If not, what does it mean?
Liono4ka [1.6K]

Explanation:

Refactoring consists of improving the internal structure of an existing program's source code, while preserving its external behavior. 

6 0
3 years ago
Other questions:
  • Which of these is a major mobile game developer?
    15·2 answers
  • Hi <br> What exactly does this project want from me?thanks for riding
    5·1 answer
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
    9·1 answer
  • if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandw
    6·1 answer
  • All websites with medical information should be considered credible.
    15·2 answers
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Ania has written this SimpleStopwatch class. In which line is she measuring the elapsed time?
    13·1 answer
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!