1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
4 years ago
14

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen

tication and __________ process.
Computers and Technology
1 answer:
Ksju [112]4 years ago
5 0

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

You might be interested in
Help on What i should say to my IT school lady? Read all three pages
avanturin [10]

Answer:

if you were to rest my would I still be able to have all my stuff that I have done if so I think you could reset it for me

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
Write a JavaScript program to generate the following pattern but the number of rows should be user input.
Nookie1986 [14]

Answer:

Testicles

Explanation:

u sukkk

3 0
3 years ago
Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of presentation program sh
emmainna [20.7K]

He should use the Format feature.

4 0
4 years ago
Read 2 more answers
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
padilas [110]

One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server

<h3>What is a Peer to Peer (P2P) Network?</h3>

In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.

In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

Complete Question:

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

1) Additional costs

2) none of these choices

3) Decentralized data access

4) Less secure

5) Difficult to expand

6 0
2 years ago
Algorithm to print the first 10 odd numbers​
77julia77 [94]

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

4 0
2 years ago
Other questions:
  • The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case a
    15·1 answer
  • 4. The clutch pedal is found in cars with manual and automatic transmissions.
    6·1 answer
  • What additional information could you add to a sketch to provide other team members with a more accurate design drawing?
    9·1 answer
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Help with number 12 please!
    15·1 answer
  • What will the following segment of code output if 11 is entered at the keyboard? int number; cin &gt;&gt; number; if (number &gt
    12·1 answer
  • ___signs tell you what you can or can't do, and what you must do ?
    5·2 answers
  • What is modularity? Help asap
    9·1 answer
  • Anyone else 17 and still plays rblox xd?
    8·2 answers
  • The backbone networks of the Internet are typically owned by long-distance telephone companies called
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!