1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
13

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to

give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
7 0

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

You might be interested in
Two organizations cannot have the same name for a computer true or false
liberstina [14]
The answer is False.  Two organizations can have the same name for a computer.  <span>Both </span>computers may<span> have the </span>same name<span>, are on the </span>same<span> subnet, and are on the </span>same domain<span>. But each </span>computer<span> has a unique IP address.</span>
4 0
3 years ago
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
. Use one command to create a /sales directory with the permissions of 770
mars1129 [50]

Answer:

mkdir -m 770 sales

Explanation:

The command mkdir is used to create a directory and the attribute or flag

-m is used to  assign permissions on create a folder.

Example:

mkdir -m 770 sales

Create a folder with permissions 770 with name sales

7 0
3 years ago
The first popular personal computer with a graphical user interface was the Apple Macintosh. Compaq Presario. IBM PC. NeXT works
Pavlova-9 [17]

Answer:

The answer is the Apple Macintosh

Explanation:

The Apple Macintosh PC was the first widely sold and most popular PC with a GUI. It was based on its earlier predecessor called the Apple Lisa which was later killed by the Apple Macintosh OS. Prior to the Apple Macintosh was the Xerox PARC which was the first PC to support an OS that was based on GUI. However, the Xerox was not a popular commercial product  and was intended for University research only

7 0
3 years ago
1. “Paraan nga dyan, Liza!"<br> A.tae<br> B.utit<br> C.pwet
mariarad [96]

Answer:

B

Explanation:

3 0
3 years ago
Other questions:
  • Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
    12·1 answer
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • Which type of password would be considered secure
    13·2 answers
  • what is the definition of web search(ing)? when I look it up it keeps trying to give me definitions for search engines but that'
    10·2 answers
  • A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S
    14·1 answer
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • Sorting an Array of Clocks Displaying in a GUI/Creating a Class Create a class called Clock to represent a Clock. It should have
    7·1 answer
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • Find H.C.F of 4,5,10 by all the three methods.​
    11·1 answer
  • When you are writing, which of the following can you do to help your
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!