1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
13

For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)

a. Secret information b. Personnel information c. Payroll information d. Sensitive information
Computers and Technology
1 answer:
larisa86 [58]3 years ago
7 0
If I'm correct C Payroll information
You might be interested in
Which backup requires a small amount of space and is considered to have an involved restoration process?
dusya [7]

Incremental backup needs a small amount of space and exists considered to have an involved restoration process.

<h3>What is Incremental backup?</h3>

A backup or data backup exists as a copy of computer data taken and stored elsewhere so that it may be utilized to restore the original after a data loss event. The verb form, directing to the process of doing so, exists as "back up", whereas the noun and adjective form is "backup".

An incremental backup exists a backup type that only copies data that has been changed or made since the previous backup activity was conducted. An incremental backup approach exists used when the amount of data that has to be protected stands too voluminous to do a full backup of that data every day.

An incremental backup exists one in which successive copies of the data contain only the portion that has been modified since the preceding backup copy was made. When a full recovery is required, the restoration process would require the last full backup plus all the incremental backups until the point of restoration.

Hence, Incremental backup needs a small amount of space and exists considered to have an involved restoration process.

To learn more about Incremental backup refer to:

brainly.com/question/17330367

#SPJ4

6 0
2 years ago
True or false?
GaryK [48]

Answer:

True

Explanation:

The Federal communications commission (FCC), is responsible for evaluating the effect of radio frequency and electromagnetic radiations and emissions on the consumers of products which make use of these frequencies and radiation energy. Devices such as cell phones are not allowed to emit radiation higher than a certain safe standard or frequency, set by the Federal communications commission.

The Federal communications commission also provides bulletins and publications that present safety information and guidelines for industries and consumers involved with radio frequency and electromagnetic radiation.

4 0
4 years ago
Thomas owns a small Web services company and currently owns and maintains all his own computing hardware. He plans to develop an
Stels [109]

Answer: Hello the options related to your question is missing attached below are the options

answer : unlimited computing capacity for a low monthly fee ( A )

Explanation:

Since Thomas plans to develop a new service that will require his computing capacity to either double or triple, The best way of transitioning to the public cloud that might help Thomas meet up the requirement is Using unlimited computing capacity for a low monthly fee

7 0
3 years ago
A type of security control that takes measures to help restore a system is referred to as:
vovikov84 [41]

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

4 0
3 years ago
Which component allows you to enjoy cinematic
love history [14]

external hard drive

external hard drive

3 0
4 years ago
Read 2 more answers
Other questions:
  • Before entering a loop, the first input, or ____, is retrieved.
    14·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • I need help <br> Match each words with its definition!!!<br> Please helpppppppp
    12·1 answer
  • Middleware is software used to: a. connect processes running on different computer systems across a network. b. integrate a comp
    8·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • Which of these are credible sources? Check all that apply.
    10·1 answer
  • Which below best describes JavaScript? *
    8·2 answers
  • How Do you get Splatoon two for free
    6·2 answers
  • I need help 40 points and brainless if you answer
    7·2 answers
  • Create a text file content.txt and copy-paste following text (taken from Wikipedia) into it: A single-tasking system can only ru
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!