1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
14

A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti

ve file from the laptop has been found on another users laptop. How could the user have prevented this breach?
Computers and Technology
1 answer:
jekas [21]3 years ago
6 0

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Classify the functions of dhcp and dns protocols​
Yuki888 [10]

Answer:

Dynamic Host Configuration Protocol (DHCP) enables users to dynamically and transparently assign reusable IP addresses to clients. ... Domain Name System (DNS) is the system in the Internet that maps names of objects (usually host names) into IP numbers or other resource record values.

8 0
3 years ago
Suppose you're trying to remove the clamp from a ground strap that's connected to a battery. The clamp won't come loose. Which o
Mekhanik [1.2K]
The answer would be B.
5 0
3 years ago
Read 2 more answers
A word I know, six letters it contains, remove one letter and 12 remains, what is it?
gulaghasi [49]

Answer:

dozens

Explanation:

3 0
3 years ago
A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
BlackZzzverrR [31]
False, absolute references have two dollar signs
4 0
4 years ago
Andrew’s Complete Cameras offers its customers an interactive website to help them choose the best camera for their lifestyle. B
julsineya [31]

Answer:

The correct answer is letter "A": Engage.

Explanation:

Social media has gained importance not only as an informative medium but as a means for marketing. The 4E framework states the four basic characteristics social media advertisement should fulfill. Those components are:

  • Excite.<em> Provide customers attractive offers.</em>
  • Educate.<em> Give consumers information about the product and the offering.</em>
  • Experience.<em> Allow direct or indirect interaction with the good.</em>
  • <u>Engage</u>.<em> Involve customers in activities related to the product that transcend the simple buying of the good.</em>
8 0
3 years ago
Other questions:
  • THE bestValue PROBLEM Using the Camera structure defined in file p1.cpp, write the function named bestValue(). The function take
    13·1 answer
  • What is the Documenter?
    10·1 answer
  • Do you think the current system of punishment in the United States works? Why? What would you change?
    13·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • Plz hurry it’s timed
    5·1 answer
  • Please answer it’s timed
    11·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!