1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
13

Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decide

d to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network.
Computers and Technology
1 answer:
miv72 [106K]3 years ago
8 0

Answer:

Access Control List is the correct answer to the following question.

Explanation:

The following answer is correct because by the ACL we can access and refusal of services that is controlled. It used to filter traffic for the network and it also used give the extra securities to protect the network. AVL provides an authorization attached to the object that define which persons are allowed for access to the object and operations.

You might be interested in
Class Main {
Ganezh [65]

Answer:

class Main {

 static void printPowers(int howMany, int nrRows) {

   for(int n=1; n<=nrRows; n++) {

     for(int power = 1; power<=howMany; power++) {

       System.out.printf("%d ", (int) Math.pow(n, power));

     }

     System.out.println();

   }

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

class Main {

 static void printPowers(int howMany, int nrRows) {

   int n = 1;

   do {

     int power = 1;

     do {

       System.out.printf("%d ", (int) Math.pow(n, power));

       power++;

     } while (power <= howMany);

     System.out.println();

     n++;

   } while (n <= nrRows);

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

Explanation:

The for loop gives the cleanest, shortest code.

4 0
2 years ago
What are node in a computer network​
BabaBlast [244]

Answer:

A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches.

3 0
3 years ago
When people talk about "the media," they often mean:?
chubhunter [2.5K]
Storage Media such as usb flash drives, internal and external hard drives and even back-up tapes
4 0
3 years ago
When creating a presentation you should use a blank as a starting point?
Lera25 [3.4K]
A blank presentation is recommended as the starting point when creating a PowerPoint presentation.  PowerPoint <span>lets you change the appearance, layout and content of your presentation at any time. Starting with a blank presentation lets you experiment more easily with the many features this program offers.</span>
6 0
4 years ago
Which of the following is defined as the elastic leasing of pooled computer resource over the Internet? 1) Broadband 2) Wiki 3)
garri49 [273]

The cloud is defined as the elastic leasing of pooled computer resource over the Internet.

Many companies currently use the cloud to store their information and infrastructure instead of leaving it on the physical computer. As time passes, more companies have continuously started to store their information on the cloud. Predictions show that in the future, nearly all companies will use this to store information.

7 0
3 years ago
Other questions:
  • Elwin Osbourne, CIO at GFS, Inc., is studying employee use of GFS e-mail for non-business communications. He plans to use a 98%
    6·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
    7·1 answer
  • Select one or more of the following: Which of these events will cause signal(s) to be generated by the kernel (the operating sys
    6·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Explain what led to the invention of lasers
    7·1 answer
  • Which of the following number is divisible by 3? (340 , 432 , 113)​
    7·1 answer
  • In which of the following movies, multimedia's special effect is used ? *
    8·2 answers
  • Select the three subjects studied in sports biomechanics.
    9·1 answer
  • In what ways are super computer different from mainframe computers.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!