1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

Organizations must protect their sensitive information through digital security measures and their _____ through physical securi

ty measures. Select 4 options.
IT infrastructure
equipment
employees
customers
RFID systems
Computers and Technology
2 answers:
DIA [1.3K]3 years ago
7 0

The answers are:

  • customers
  • employees
  • IT infrastructure
  • RFID systems

Explanation: Correct on Edg 2021.

Andreyy893 years ago
3 0

Answer:

IT infrastructure

Explanation:

and their IT infrastructure through physical security measures. There are two main ways of "hacking" a system. One is through a flaw in the software that is someone skilled enough can manipulate in order to gain access to the system and retrieve data or manipulate the system as they see fit. The second method is physically by accessing the IT infrastructure. If you were able to do so and there are no physical security measures you could simply plug into the infrastructure and access all the information that you want because you would be completely bypassing the digital security measures by doing so. That is why physical security measures are placed so that only qualified and vetted individuals have access to the infrastructure.

You might be interested in
Choose the response that best completes the following statement.
Soloha48 [4]

Answer:

probably the 5 second pause

7 0
3 years ago
Read 2 more answers
Does the cloud solution offer equal or greater data security capabilities than those pro-vided by your organization’s data cente
likoan [24]

Answer:I think greater. Answer my question that I posted plz

Explanation:

6 0
4 years ago
An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
Natali [406]

Answer:

The answer is "Option B"

Explanation:

In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:

  • In choice A, Mostly as a unit for the projections, respondents should not use the ideal days.  
  • In choice C, Whenever the procedure should've been anonymous, no cards were released.
  • In choice D, Its mediator was incorrect and the laws were followed.
4 0
3 years ago
what programs controls all operations of the computer hardware such as memory storage devices or printers and provides for you t
IrinaK [193]
Operating Systems control all operations
6 0
3 years ago
Using the drop-down menus, correctly match the name of the person with the computer-programming
Sauron [17]

Answer:

1. Bill Gates and Paul Allen

2. Grace Murray Hopper

3. John Backus

4. Bjarne Stroustrup

5. Guido van Rossum

5 0
4 years ago
Other questions:
  • One governing factor when determining the minimum size of conduit to be used is the 
    9·2 answers
  • A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
    15·1 answer
  • Which of the following is an example of an analog medium?
    13·1 answer
  • Use both if and else may contain only one statement, you would have to use a ______ if you want to use more than one instruction
    14·1 answer
  • Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
    9·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • Describing Report Tools Functions
    9·1 answer
  • Which feature do we most likely use to quickly change the background, fonts, and layout?
    12·1 answer
  • ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
    15·1 answer
  • State two skills to be used to access information from the internet in order to avoid unwanted materials.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!