1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
11

Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa

in activities on the network?1. Syslogs2. Network flows3. Certificate authority4. Authorization memo
Computers and Technology
1 answer:
ehidna [41]3 years ago
4 0

Answer:

Option 4 is the correct answer for the above question.

Explanation:

"Authorization memo" is a type of letter which is providing to anyone when a person wants to authorize a person to do any work. For example, if a person wants to authorize another person to use his id and the password to log on the internet, then he can do it by providing the authorization letter to him. this letter is known as an authorization memo.

The above question scenario said to take the authorization letter from the CEO. so the letter is known as an authorization memo. Hence option 4 is the correct answer while the other is not because-

  • Option 1 states about Syslog which is log file states about the system error.
  • Option 2 states about the network flow which is not the correct answer.
  • Option 3 states about the certificate authority which is used for the certificate.
You might be interested in
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
Question 16 of 20
IgorLugansk [536]

Answer:

c

Explanation:

8 0
4 years ago
Read 2 more answers
Multiple Choice
earnstyle [38]
1 )  B ) I<span>ntersections.
2 ) A ) Freeways ( i believe )
Matchmaking
-</span><span>Retractable STOP sign arm ( school bus ) 
-Jaywalking ( d</span><span>angerous pedestrian practice ) 
- Moped ( </span><span>cross between bicycle and motorcyble ) 
1 ) I would say the </span><span>major cause of collisions between cars and motorcycles is due to motorcycles driving into lane/places cars can not get into. - lane splitting, traffic jam - 
2 )When there is a yeild sign or a crossing sign, it's </span><span>legal for a pedestrian to cross a roadway. ( I believe )
3)</span><span> Motorists must keep a constant lookout for pedestrians crossing and at intersections. 
4) I know when trucks are driving up or anything similar they get faster and sometimes cant control, so there are certian stops that trucks go up to make them slow down. I honeslty don't know if you should go around or not. But i hope this helps.
</span>
7 0
3 years ago
What does every shot have with regards to depth?
djyliett [7]

This can be used to capture a larger area of acceptably sharp images. This can also be referred to as a deep depth of field, and some cinematographers will simply use the term “depth” to describe shots with a large DOF. It can also be referred to as deep focus.
5 0
3 years ago
Python comes with ________ functions that have been already prewritten for the programmer.
Gnoma [55]
Python comes with built-in functions...
6 0
3 years ago
Other questions:
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • To add the word "confidential" to the background of a page, users would need to _____.
    12·1 answer
  • If a small monster collector has 20 small monster containment devices; intends to use all of those devices; has access to non-un
    13·1 answer
  • In which file format is image data compiled into a binary file? TIFF SVG CGM BMP
    11·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • One day you tap your smartphone screen to turn it on, and nothing happens. It appears to be turned off and will not turn on. Wha
    12·2 answers
  • PLEASE HURRYYY Suppose your employer wants you to purchase a tablet device that you will use to run the company's custom sales s
    15·2 answers
  • Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
    15·1 answer
  • In the earliest stages of human history, what was the only medium?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!