1. A [disk cleanup] utility searches for and removes unnecessary files.
2. [Back-up] - allows users to copy selected files or an entire hard disk to another storage medium.
3. [Firefox] is a web browser- a platform, which is used to browse the information via the internet.
Answer:
true
Explanation:
this is true because technology is anything that is ment to help mankind. chairs and tables help people. something as simple as the wheel, or shows is also technology.
This answer out of the true or false or true
Answer:
Explanation:
Proposition: Is a collection of declarative statements which has either true or false value.
a) Do not pass go. --- Not a proposition
b) What time is it? ---- Not a proposition
c) There are no black flies in Maine. --- It is a Proposition , Truth value : false
d) 4 + x = 5. ----- Not a proposition
e) The moon is made of green cheese. --- It is a Proposition, Truth value : False
Answer:
The three components used by defense in depth strategy are:
1) Physical controls
2) Technical controls
3) Adminstrative controls
Explanation:
Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.
If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.
Defense in depth strategy uses three components which are:
* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.
* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.
* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.