1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
9

In regards to network security, ________ means preventing unauthorized users from gaining information about the network structur

e, data flowing across the network, network protocols used, or packet header values. A. availability B. integrity C. confidentiality D. authentication
Computers and Technology
2 answers:
4vir4ik [10]3 years ago
8 0

Answer:

C. confidentiality

Explanation:

Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.

Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.

Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.

ratelena [41]3 years ago
5 0

Answer: C. Confidentiality

Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.

With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.

You might be interested in
A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
gulaghasi [49]

Answer:

Explanation:

Depends on the configuration of the email because there are two protocols POP and IMAP, the most recent protocol is IMAP, we can delete an email and this It moves to a To be Deleted folder, this happens because the email is stored in the server, but with the protocol POP the email is stored in the server and downloaded to the application, if you delete an email, this is deleted in all devices.

8 0
3 years ago
Read 2 more answers
A ___________ variable is declared outside all functions.
velikii [3]

Answer:

B. global

Explanation:

A global variable lives on even when a function returns.

7 0
4 years ago
Explain the derived data types in C language with examples each
IRISSAK [1]

Answer:

Array, pointers, struct, and union are the derived data types.

7 0
3 years ago
What to do if you forgot your locked notes password
rodikova [14]

Answer:

I don't have a Apple, but I suggest you either contact Apple Help, or go to settings and see if you can reset it.

Add-on:

I hope this helped you at all.

5 0
2 years ago
Read 2 more answers
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
g100num [7]

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

5 0
3 years ago
Other questions:
  • Which innovation allowed for the mass production of goods? A. Cotton gin B. Sewing machine C. Industrial lubricator D. Interchan
    6·1 answer
  • One of the disadvantages of cable technology is that:
    7·1 answer
  • Perform online or offline research to learn more about film elements. Then, write a short report on the essentials of filmmaking
    13·1 answer
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    7·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • Question 7 (True/False Worth 3 points)
    8·2 answers
  • what will allow you to immediately exit the program without rebooting the computer, when you realize your browser is not respond
    7·1 answer
  • How do you change your name on your brainly profile
    14·2 answers
  • There u go i did thereeeeeeeeeeeeeeeeeeeeeee
    13·2 answers
  • Which combining form is spelled incorrectly? group of answer choices gynic/o carcin/o nephr/o laryng/o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!