1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
6

Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the

system. If a potential employee is required to undergo a drug screening, which of the following controls is being conducted?administrative controls
Computers and Technology
1 answer:
pychu [463]3 years ago
6 0

Answer:

ADMINISTRATIVE CONTROL

Explanation:

If a potential employee is required to undergo a drug screening an Administrative Control is what will be conducted on the employee because

Administrative controls are training, procedure, policy that limit or prevent exposure of an individual to hazards. Examples of administrative controls include training, supervision, timing of work. Administrative controls are also changes in work procedures such as written safety policies, rules, supervision which is the reason the employee has to undergo drug screening using Administrative controls.

You might be interested in
teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
Andrew [12]

Answer:

In-Market audiences.

Explanation:

Steve intends for using Google display advertising to achieve new clients seeking to acquire identical items to himself. Form of in-market audience should Steve try to achieve his marketing objective.

In-market audiences seem to be a method of connecting with customers who regularly study or compare goods and facilities through Google Display Platform publishers and affiliate websites

5 0
3 years ago
Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
nikitadnepr [17]

Answer:

Pong

Explanation:

Pong

4 0
2 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
3 years ago
Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management
Elis [28]

Answer:

Resources

Explanation:

Carlie certainly requires to review the resources. It is important to find out how many software engineers, testers, etc. are available. And only then Carlie can find out the exact deadlines as required here. And hence, she must have look at the resources while determining the specific deadlines. Hence, resources are the correct option.

3 0
3 years ago
Read 2 more answers
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
3 years ago
Other questions:
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • Amitha writes up a one-page summary of a novel during her summer internship at a publishing company. When she reads over the pag
    10·1 answer
  • Which of the following is not a method of data management?
    15·1 answer
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • Which term describes a visual object such as a picture a table or text box
    15·2 answers
  • What is normalization?
    7·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • ¿ El Parque Fray y Jorge es un patrimonio Cultural/Natural o patrimonial de Chile ?
    14·1 answer
  • YASHARI earns $27,000 per year, is single, and lives in Wyoming. She has $7000 in Direct Subsidized loans and another $19,000 in
    9·1 answer
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!