1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
14

You have been asked to create an authentication security plan for your company. Which of the following components would you inco

rporate to ensure your company is secured?
a. Use a password manager to create unique strong passwords.b. Have the computer identify blood type and oxygen levels.c. Use biometric security that uses characteristics of your face, hands, or eyes.d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
5 0

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

You might be interested in
Identify the following verb by number and person by checking on the appropriate boxes.
Makovka662 [10]
Second person ig Imao yeah
3 0
2 years ago
Read 2 more answers
Explain how communication managerial efficiency​
kakasveta [241]

Answer:

The efficiency of manager depends upon his ability to communicate effectively with the members of his organisation. It is only through communication that management conveys its goals and desires, issues instructions and orders, allocates jobs and responsibility and evaluates performance of subordinates.

pls tag me brainliest

8 0
3 years ago
Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as sen
RideAnS [48]

Answer:

"Application programming interface(API)" is the correct answer for the above question.

Explanation:

  • API is an interface which is used to call the different software in the currently developing software by the developer to inbuilt some task of that software.
  • The full of this is the Application programming interface. It is an interface or guidelines which are used to tell the other software, that how a particular service is performed.
  • The above concept is asked by the above question. so the answer is API.
4 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
The concepts of culturally approved goals and the legitimate means of achieving these goals was devised by
xxMikexx [17]

the answer is not C the anwser i have no idea what it is but on my test i got it wrong.

6 0
3 years ago
Read 2 more answers
Other questions:
  • In a spreadsheet, there are many features that help you edit quickly. True False
    11·1 answer
  • Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They
    8·2 answers
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    14·1 answer
  • Define the proposition in symbols using: p: The weather is bad. q: The trip is cancelled. r: The trip is delayed. Proposition in
    7·1 answer
  • Read the following example cover letter:
    7·2 answers
  • Renae wants to write a blog about her favorite sports stars. She wants the blog to be informative and visually appealing, so she
    13·2 answers
  • Which of the following defines a network
    7·1 answer
  • Hi who plays among us
    9·1 answer
  • The entities on which data are collected are _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!