1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
6

Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
4 0

Answer:

D. Restrict user access to the server center by using keycards

Explanation:

A keycard is a modern smart plastic card with an application programming interface. It stores a digital signature on an embedded magnetized strip that is used to operate an electronic access control lock instead of using a key to open a door.

You might be interested in
If an engineer wants to verify changes that she has been making on a router, which commands will allow her to check the routers
Stells [14]

Group of answer choices.

a. Show flash

b. Show version

c. Show controllers

d. Show running-config

e. Show startup-config

Answer:

d. Show running-config

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

In order to send packets to a remote destination using a router, these three (3) parameters must also be configured on a host.

I. Default gateway

II. IP address

III. Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.

In Computer networking, network devices such as routers and switches are usually configured (programmed) through the use of specific network commands commonly referred to as configs e.g show int description, config terminal (config t), show IP address, etc.

In this scenario, the command which will allow her to check the router's current configuration before saving is Show running-config. It would display all the necessary information such as router name, banner of the day (BOTD), VLans, ports, default gateway, etc., about the router and its current firewall configurations.

5 0
3 years ago
PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
Paraphin [41]
3.2 i believe. I looked it up though
5 0
4 years ago
Read 2 more answers
Question 1
elena-14-01-66 [18.8K]

Answer:

Option A, Volts

Explanation:

Volts  is the unit of pressure of the electrons in a wire. One Volt is the required pressure to allow flow of one unit of current in a circuit against a resistance of one ohm.

Hence, option A is correct

7 0
3 years ago
A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
Bad White [126]

Answer:

B

.Identify the problem

6 0
4 years ago
After a robbery, what is the purpose of conducting a neighborhood canvass?
andrew-mc [135]

Answer:

If im correct this would most likely be D perhaps?

Explanation:

I say that because like, I would assume they canvass it so that they are able to see anything that looks out of place

6 0
3 years ago
Other questions:
  • What's the best way to change the font size of all your notes pages at once?
    14·2 answers
  • An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
    15·1 answer
  • What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
    8·1 answer
  • Which of the following statements about cover letters is false?
    14·2 answers
  • Who is the host in super monkey ball?
    14·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the contr
    8·1 answer
  • Any computer expert to help me answer this question plz am giving brainliest
    11·1 answer
  • Please explain what is Ribbon?  give examples​
    7·2 answers
  • Consider some of the widespread global issues that we face here on Earth and briefly describe them. Then, choose one of the spac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!