1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
13

A document repository is down when you attempt to access it. which isa principle is being violated?

Computers and Technology
1 answer:
Tju [1.3M]3 years ago
3 0
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
You might be interested in
In a _____ network, each device on the network is attached to a central router. If the router fails, then the other devices will
Damm [24]

Answer:

In a STAR TOPOLOGY network, each device on the network is attached to a central router. If the router fails, then the other devices will be unable to communicate, but if only one connected device fails, then all other devices will still be able to communicate.

Explanation:

In this type of topology all the computers are connected to a single router through a cable. This router is the central node and all others nodes are connected to the central node.

7 0
3 years ago
What is the Windows command to see the IP configuration of the PC?
lisov135 [29]
The answer is ipconfig
4 0
3 years ago
How many degrees of freedom does any unconstrained object have in 3-D modeling?
Free_Kalibri [48]
I think its 6 degrees

3 0
3 years ago
Write 'T' for true and 'F' for false statements.
asambeis [7]
1-F
2-T
3-F
4-F
5-F
6 T
7-T
3 0
2 years ago
What is telepresence
Vitek1552 [10]
The use of virtual reality technology, especially for remote control of machinery or for apparent participation in distant events.
7 0
3 years ago
Other questions:
  • Steps needed to deposit cash on cash deposit machine
    6·1 answer
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • Computer programming is an essential skill for anyone wishing to pursue a career in cybersecurity. What might be a good ""first
    13·1 answer
  • Java-Script Concept quiz:
    6·1 answer
  • How are search results organized?
    6·1 answer
  • The ratio of boys and girls is 4:5 calculate the number of boys if the are 1080 learners in schools​
    11·1 answer
  • 3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
    5·1 answer
  • State the difference between a monitor and a television​
    5·2 answers
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!