1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
10

Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti

on standard attempts to keep a workstation free from viruses and other malware. However, this policy is a preventive control, which means that it tries to prevent an infection through installing scanning software. As such it is lacking in detection control, so it cannot detect and report symptoms of an infection.
a. true
b. flase
Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
5 0

Answer:

B. False

Explanation:

This is false because for a policy to prevent an infection, there are different processes that takes place. Such processes include detecting the type of infection that enters into the system and then trying to fight it off through the programmed tools.

Detection and reporting of symptoms also helps in the identification of the infection before it is fought.

You might be interested in
Create a list of consent rules to live by​
Agata [3.3K]
Intercourse
Kiss
Going into someone’s house
4 0
3 years ago
Happy Valentine's day!!
Lorico [155]
Happy valentine’s u too !!
7 0
2 years ago
What does the term, World Wide Web refer to? the Internet a selection of documents from zoos and universities related to web-spi
kupik [55]

Answer:

all hyperlinked web pages on the internet

Explanation:

The term 'world wide web (WWW)' refers that, it is web of pages on the internet that hyperlinked. These pages are from all over the word that's why called world wide, and word web means that all the pages are interlink with each other as like web.

7 0
3 years ago
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
strojnjashka [21]
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
8 0
3 years ago
Imagine that a you and a friend are exercising together at a gym. Your friend suddenly trips and falls, and it is clear that he
ladessa [460]

Answer:

The sprain happened when the friend fell and the ligaments (in the ankle)  stretched, twisted or possibly tore. Sprain is manifested by pain, swelling, bruising and inability to move.

Explanation:

Here the appropriate steps to stabilize the injury:

1.       Call for help.

2.       Rest the injured area to avoid further damage.

3.       Put ice ( for 15 to 20 minutes) to help limit the swelling.

4.       Apply compression bandage to prevent more swelling.

5.       Elevate the injured ankle above the heart to limit swelling.

Hope this helps UvU

4 0
3 years ago
Other questions:
  • Which type of navigation involves multiple frames that are linked to a number of other frames?
    9·1 answer
  • You just got a shipment of 10 network-attached laser printers. You want these printers to always have the same address but you w
    14·1 answer
  • What should you use as the argument for the goto() command?
    6·1 answer
  • Software that translates the sound of human voice into text is called:________.
    14·1 answer
  • Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
    11·1 answer
  • Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Which of the following is not a language commonly used for web programming?
    8·2 answers
  • How do you save a document in a format so that any reader can view it?
    5·1 answer
  • What is boot sector virus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!