The answer to this problem is Linux
Answer:
well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance
of your machine
Explanation:
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
Answer:
c. are based on statistical data, measurement and metrics
Explanation:
Data driven process are process that are not based on intuition but rather are based on data. This data serves as evidence to back a decision that is to be taken. It therefore means that, whatever decision that will be taken, such a decision will be based on the data presented.
Answer:
apple watches can break, and they can deffinetly have cameras if they engineered right.
Explanation: