1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
13

Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit

ting classified information up to top secret.
Computers and Technology
1 answer:
xeze [42]3 years ago
7 0
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

You might be interested in
which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
snow_lady [41]

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

6 0
1 year ago
Please help. will give u brainliest!! khan academy computers and the internet!!
Oxana [17]

Answer:

a or c

Explanation:

think of which answer seems illogical.

5 0
3 years ago
True or false? To help improve SEO, your URL should match the title of your blog post, word for word.
Vsevolod [243]

Improving SEO, by ensuring the URL matches the title of your

blog post, word for word is False.

<h3>What is SEO?</h3>

This is referred to as Search engine optimization. It is used to

improve a site by ensuring that is more visible when people

search for certain things or words.

The URL should contain only key words and unnecessary ones

should be eliminated which is why it isn't compulsory for the title

to be word for word.

Read more about Search engine optimization here brainly.com/question/504518

7 0
2 years ago
Which activity represents a violation of the licensing agreement?
Lena [83]
A) <span>unauthorized duplication of software </span>
6 0
3 years ago
Read 2 more answers
Good keyboarding technique includes ________
Svetlanka [38]

Answer:

Keeping you hands on the homerow keys

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • What happens when your computer is in Hibernate mode?
    12·1 answer
  • What lie does E.D. tell to keep the musical from being canceled? There is a television crew coming to do a story on it. Jake wil
    6·1 answer
  • In Microsoft Word you can access the _______ command from the "Mini toolbar".
    9·1 answer
  • It can be useful to have a mentor because they will help you
    7·2 answers
  • Advertising is organized around four distinct groups. The _____ group includes the photographers, the illustrators, video produc
    9·1 answer
  • Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
    11·1 answer
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • BEING TIMED HELP ASAP
    12·2 answers
  • For current events, what type of sources would we use to learn about them?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!