1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
15

Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n

ecessary to work in the information security field. What certification would be an appropriate first step for her?
A) Certified Information Systems Security Professional (CISSP)
B) GIAC Security Expert (GSE)
C) Security+
D) CompTIA Advanced Security Practitioner (CASP)
Computers and Technology
1 answer:
rewona [7]3 years ago
8 0

Answer:

Option C. Security+ is the correct answer.

Explanation:

You might be interested in
Adding _____ will allow the user to create text as it will often appear in publications with multiple articles, such as a newspa
mart [117]
Does applications make sense <span />
5 0
3 years ago
Read 2 more answers
Without a/an ________. a computer is useless
Len [333]
Without a/an Operating system. a computer is useless
3 0
3 years ago
How many worksheets display in the Excel window when you create a new blank workbook? A. 1 B. 2 C. 3 D. 4
gtnhenbr [62]

only one displays (answer a)

7 0
3 years ago
Read 2 more answers
Each codec is stored within a file called a(n) ____ file.
frutty [35]
Im like 90% sure its a container file
5 0
3 years ago
Which of the following is NOT a reason to use cryptography?
Mars2501 [29]

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • Select four programs that make up system software.Select four programs that make up system software.
    8·1 answer
  • Care and feeding for computer
    7·1 answer
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
  • explain why the database system would not allow a tuple to be inserted into the database through this view
    12·1 answer
  • What is the key difference between a class and an object
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!