1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
13

Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit

ting classified information up to top secret.
Computers and Technology
1 answer:
xeze [42]3 years ago
7 0
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

You might be interested in
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but
BabaBlast [244]

Answer:TRUE

IT IS AN OPEN SOURCE SOFTWARE

Explanation:AN OPEN SOURCE SOFTWARE is a software which is made to accessed free of charge,no lincense is required for the use of the software. This type of softwares are usually developed to help the users which may be students or for religious purposes or for vunerable persons whom the developer feels should have access to the software. The only fee required is for maintenance or for other special features. GOOGLE'S ANDROID OPERATING SYSTEM is considered as an open source software.

8 0
3 years ago
Which of the following provides button to facilitate
Triss [41]

Answer:

fdsjhvnbldisuacvnndioavndaf vdsieaonvafvno[avinagb difjiiojdfoigp;afdsigadpg;

Explanation:

5 0
3 years ago
Which of the following sets of data would be represented best in histogram?
nexus9112 [7]
I think it is B I am pretty sure of it
3 0
3 years ago
Read 2 more answers
Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac
irina [24]

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

7 0
4 years ago
Match each word to its correct meaning.
Juli2301 [7.4K]

Answer:

1. Computer Network - a group of computers that are  Interconnected in order to share  Information or documents  the component in the body of the  computer that stores all of your files and  folders

2. CPU - the central processing unit or part  Inside the body of the computer that  enables the computer to function, sometimes referred to as the brain of the  computer

3. Hard Drive - The componet in the body of the computer that stores all of your files and folders

4. Hardware - Physical parts of the computer or technical equipment

5. Internet - Interconnected computer networks throughout the world that everyone can use

6. Laptop - A small mobile computer

7. Motherboard - The main board in the body of the computer that contains chips and other compnents

8. Software - A computer program or a set of instructions for the hardware to perform

8 0
3 years ago
Other questions:
  • Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use compressed air to blow dirt ou
    13·2 answers
  • Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission media." Explain why
    12·2 answers
  • A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a
    5·1 answer
  • Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerica
    15·1 answer
  • Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
    13·1 answer
  • A large electronic game manufacturer decides to establish a customer service center in Lahore, Pakistan. This is an example of _
    10·1 answer
  • This is your code.
    9·1 answer
  • Who invented slide Rule and when?​
    7·2 answers
  • I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
    10·2 answers
  • State the domain and range for the following relation. Then determine whether the relation represents a function. A box labeled
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!