1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
4 years ago
12

The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F

alse
Computers and Technology
1 answer:
Alex Ar [27]4 years ago
3 0

Answer:

True is the correct answer for the above question

Explanation:

  • The OSI security architecture is a security framework that is used to secure the data packets when it is going to transfer on the internet for communication.
  • It is used to define the security rules and mechanism which need to secure the data packets.
  • It mainly focuses on Security services, Security attacks, Security mechanisms.
  • The above question-statement states about the framework which defines the security mechanism to secure from the attacks are known as OSI Security architecture which is the correct statement which is described above. Hence True is the correct answer.
You might be interested in
Create a float variable named diameter. This variable will hold the diameter of a circle. d. Create a float variable named PI.
Basile [38]

Answer:

float diameter=2*r; //hold the diameter of a circle

float PI; // float variable named PI.

Explanation:

Here we have declared two variable i.e diameter and PI of type float. The variable diameter will hold the diameter of a circle i.e  2*r  where r is the radius of a circle.

Following are the program in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

   float r=9.2; // variable declaration

float diameter=2*r; //hold the diameter of a circle

float PI=3.14; // float variable named PI hold 3.14

cout<<"diameter IS :"<<diameter<<endl<<"PI IS :"<<PI; // display value

  return 0;

}

Output:

diameter IS :18.4

PI IS :3.14

8 0
3 years ago
When do I use while loops
Marat540 [252]

Answer:

When you dont know how long the loop is going to run for

Explanation:

7 0
3 years ago
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
When you assign a value to an int variable, you do not type any commas; you type only digits and an optional plus or minus sign
worty [1.4K]
Negative integer is the correct answer
7 0
4 years ago
An analyst determines the value of investments<br><br> True<br><br> False
satela [25.4K]
The correct answer is True
8 0
3 years ago
Read 2 more answers
Other questions:
  • These things are commonly found on the front of desktop computer cases:
    12·1 answer
  • Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.
    5·1 answer
  • how such a company can improve the focus and relationship with customers, and what they will benefit from this improvement.
    10·1 answer
  • Which of the following could be useful during system testing?
    6·1 answer
  • In what year was the 1st zelda game released
    5·2 answers
  • Join Viber Creations on Viber https://invite.viber.com/?g2=AQAboWGw5hKZN009gOjCULc4cbWKWg42%2BIFmJoPC93MPlt9kstcpJyU6yagPh050 |
    6·1 answer
  • What does this icon mean? <br> Plz hurry it’s for a school quiz you will get a brainly
    10·1 answer
  • HELP PLEASE!!!!!!!!!<br> Please fix the coding! thanks I give brainliest
    5·1 answer
  • A _____ focuses on creating software systems like tools, utilities, antivirus programs, and operating systems.
    12·2 answers
  • What is the full form of MPEG?<br> The full form for MPEG is ________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!