1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
3 years ago
15

Detective access controls use fences, security policies, security awareness training, and antivirus software to stop an unwanted

or unauthorized activity from occurring.
True / False.
Computers and Technology
1 answer:
vlabodo [156]3 years ago
5 0

Answer: False

Explanation:

Detective access controls identifies the violations of security after they have occurred.  As part of the instigation they provide information on the violation.. It of two types:

1.  technical detective control.

2. physical detective control.

However in the given passage it is preventive access controls that use fences, security policies, security awareness training, and antivirus software to stop an unwanted or unauthorized activity from occurring.

You might be interested in
Most microsoft windows fatal errors (blue scree of death) are caused by:
MAVERICK [17]
Errors in kernel mode (CPU running in ring 0) are usually fatal. This happens mostly inside device drivers.
7 0
3 years ago
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
sasho [114]

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

<h3>What is the joke about?</h3>

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

brainly.com/question/21475482

#SPJ1

7 0
2 years ago
What is live ware in relation to computer​
Zarrin [17]

Answer:

It is a slang term used to denote people using (attached to) computers.

6 0
3 years ago
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
Stolb23 [73]
Administrator privileges
6 0
3 years ago
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
4 years ago
Other questions:
  • Colours in art packages are often given Hex codes as illustrated below with #00ccff. Why is Hex used in this way rather than the
    11·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • How can you have a safe browsing experience
    5·1 answer
  • What is the meaning of website cookies? brief explanation ​
    9·2 answers
  • Which of the following best describes when a packet is addressed so that more than one destination can receive it and the first
    11·1 answer
  • A small cluster of three countries (China, Malaysia, and Korea) are creating a reputation for this type of outsourcing. a. Farsh
    6·1 answer
  • What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP add
    9·1 answer
  • HELP ASAP. Which of the following is the best example of an installation issue? A computer can’t find the file that it needs to
    7·1 answer
  • Any information that is processed by and sent out from a computer or other electronic device is considered __________.
    13·2 answers
  • [ASAP!] Which of these can be a problem for people with accessibility issues? Select 4 options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!