1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
13

Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan

y encryption keys to ensure secure transmissions. which choice lists an important reason for encrypting the company's network transmissions?
Computers and Technology
1 answer:
babunello [35]3 years ago
5 0

Answer: The company wants it's data to be secure while in transit.

Explanation: Obviously, this is meant as a multiple choice question and you haven't provided choices. But, the correct answer will mention something about data being protected while in transit (being transmitted from one device to another).

You might be interested in
Suppose we have a linearly separable dataset, and we divide the data into training and validation sets. Will a perceptron learne
Sauron [17]

Answer:

Theoretically Yes

Explanation:

The data given is linearly separable. So, the subset of the data will also be linearly separable. And it will pass for all training dataset. However, you should definitely never expect such thing In any real-life problem because the data is noisy, for a bazilion of reasons, so no model is guaranteed to perform perfectly.

3 0
3 years ago
Vannevar bush imagined a desktop computing machine that would allow people to access data stored in various information centers
Bas_tet [7]
I'm pretty sure it is A) Memex.
5 0
3 years ago
Which of the following best describes the impact of Creative Commons?
Pachacha [2.7K]

Answer:

it’s just a screenie hope it helps

8 0
3 years ago
Playstation 4 how to change mtu settings
tamaranim1 [39]
Ask google mam.............
4 0
3 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Other questions:
  • You can access various sites on the WWW by using hyperlinks or by
    14·1 answer
  • You can create a database using one of the many templates available or by creating a new ______ database.
    9·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • How do governments correct for negative externalities?
    5·1 answer
  • Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less
    6·2 answers
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • How many strings with five or more characters can be formed from the letters in seeress?
    15·1 answer
  • Select the correct answer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!