1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
9

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structur

e, data flowing across the network, network protocols used, or packet header values. A. availability B. integrity C. confidentiality D. authentication
Computers and Technology
2 answers:
4vir4ik [10]3 years ago
8 0

Answer:

C. confidentiality

Explanation:

Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.

Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.

Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.

ratelena [41]3 years ago
5 0

Answer: C. Confidentiality

Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.

With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.

You might be interested in
Using a windows computer, to expand a branch of the folder tree you would _____.
s344n2d4d5 [400]
A folder can include everything from documents and music, to applications [like Word or Excel or your favorite browser]. But computer folders can also contain other folders, lots of them, and those sub-folders can contain folders of their own. This is the called folder tree. The trunk of the tree is the Desktop. Then there are several folders like Recycle Bin, Control Panel,..The most important branch is the one called ‘Libraries’. Here are the Photos, Music, Videos,...
<span>Using a windows computer, to expand a branch of the folder tree you would right click </span>beside various folders and drives to expand the folder tree.

8 0
3 years ago
The name of a .java file should ______________________________. Always match the name of the Class inside Should always start wi
natita [175]

Answer:

The name of a .java file should <u>always match the name of the class inside.</u>

Explanation:

In Java programming the program written in code editor is first saved with .java extension. The name of this .java file should be same as that of  the class declared inside the file.

This .java file is then compiled and  converted to .class file which contains the java bytecode. This bytecode can then be executed by java virtual machine(JVM).

However it is not always necessary that name of .java files should be same as that of class inside it. The name should be same only when the class inside is declared as public.

In case it is not declared as public one can name .java file different than the actual class name.  

7 0
3 years ago
Can someone tell me what this means Higfaa
Arisa [49]

Answer:

it's a Jamaican slang

Explanation:

it depends on the wah it is used

7 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
Slav-nsk [51]

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

brainly.com/question/4264949

#SPJ1

8 0
2 years ago
The letters LAN stand for Area Network.
Slav-nsk [51]

The letter LAN stand for : Local Area Network

8 0
3 years ago
Read 2 more answers
Other questions:
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Hydropower uses moving water to do work, such as grinding grains in a mill. True False
    7·1 answer
  • Ex: If the input is: Pat Silly Doe the output is: Doe, P.S.
    9·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • PLEASE HELP I mainly only need the answer for 4.
    5·1 answer
  • Do you need a separate password for each slack channel
    13·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
  • Is Using programming libraries is one way of incorporating existing code into new programs true
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!