1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
2 years ago
13

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to

give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Computers and Technology
1 answer:
mihalych1998 [28]2 years ago
7 0

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

You might be interested in
Some of your non-Windows clients aren't registering their hostnames with the DNS server. You don't require secure updates on the
Ivenika [448]

Answer:

c.Update DNS records dynamically for DHCP clients that don't request updates.

Explanation:

A DNS server is a computer server that contains a database of public IP addresses and their associated host names, and in most cases serves to resolve, or translate, those names to IP addresses as requested.

A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices.

Dynamic DNS is a method of automatically updating a name server in the Domain Name Server, often in real time.

5 0
2 years ago
Explain how abstraction is used in a GPS system?
zhenek [66]
I hope that this answer will help u to solve your problem. But u have tto take the importance clues only .

5 0
3 years ago
Function of network security​
myrzilka [38]

Answer:ffffffffffffgggggg

Explanation:vvvc

5 0
3 years ago
A wiki is best defined as:
Basile [38]

Answer:

a reverse chronological journaling site. a user-collaborated content site, typically text in nature

Explanation:

It is the website that is based on knowledge. It is the text based site that is also called structure content.

The most common example of Wiki is Wikipedia.

8 0
3 years ago
HELP LOTS OF POINTS! I WILL GIVE YOU 100+ POINTS IF ANSWERED CORRECTLY!!!
Delicious77 [7]

Answer:

E) all of the above

Explanation:

Your device can track your location, which means that it will tell where you've been. When you post on social media or just online, you are sharing what you're thinking. Your friends and family can easily be traced back to you, so they know who your friends and family are, and we leave evidence of what we've done because whatever you click gets tracked. hope this helps :)

4 0
2 years ago
Other questions:
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
    14·1 answer
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet.
    15·1 answer
  • What are 7 key traits for knowing your audience
    6·2 answers
  • The closing of the letter should have at least
    12·1 answer
  • PLZZZ HELP!!! I’ll give brainliest
    12·1 answer
  • Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
    15·1 answer
  • Do earthquakes ever happen in Malaysia?​
    8·1 answer
  • Computer C’s performance is 4 times as fast as the performance of computer B, which runs a given application in 28 seconds. How
    5·1 answer
  • How many accelerometers are there in an IRS system?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!