1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
2 years ago
13

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to

give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Computers and Technology
1 answer:
mihalych1998 [28]2 years ago
7 0

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

You might be interested in
A new folder can be created by
user100 [1]

Answer:

The fastest way to create a new folder in Windows is with the CTRL+Shift+N shortcut. 1. Navigate to the location where you want to create the folder. You can create a new folder at any location on your hard drive or within another folder (creating a subfolder) in File Explorer.[/tex]

5 0
2 years ago
Read 2 more answers
__________ is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac ad
lukranit [14]

MAC address spoofing is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

<h3>What is MAC spoofing?</h3>

It should be noted that MAC spoofing simply means a technique for changing the factory assigned media access control to a network interface.

In this case, it is a a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

Learn more about spoofing on:

brainly.com/question/15179149

#SPJ12

6 0
2 years ago
The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
Alik [6]

Answer:

D. Identify the problem.

Explanation:

         

The five steps are -

  • Identify the problem
  • Understanding the problem
  • Select any alternative way to solve a problem
  • Select the best way to solve a problem from the list of alternative solutions.
  • List the instructions to solve the problem using the selected solution and evaluate the solution .

Identify the problem - This is the first steps towards solving a given problem. One must properly comprehend what exactly the challenge is.

8 0
3 years ago
Which is not a category of business or industry covered under OSHA standards? A. Construction B. General Industry C. Maritime D.
cestrela7 [59]
The answer from the given option is "D", "<span>OSHA covers all categories of business and industry".


OSHA stands for </span>Occupational Safety and Health Administration, which is an agency of the United States Department of Labor. The four categories of business and industry that are covered by the standards are general industry, maritime, construction and agriculture. So the the answer from the given options is D, because a, b and c are included in the categories.
5 0
2 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Other questions:
  • Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
    15·1 answer
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • What kind of problems could you run into if you format a cell with the wrong format for the data type?
    15·2 answers
  • What theme could come from Piper's feelings and actions. Pixars short film piper
    11·1 answer
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In 1–2 sentences, descri
    9·2 answers
  • A 1024-bit message is sent that contains 992 data bits and 32 CRC bits. CRC is computed using the IEEE 802 standardized, 32-degr
    8·1 answer
  • Given an int as the input, print all the factors of that number, one in each line. For example, if the input is 15 The output wi
    14·2 answers
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    10·1 answer
  • A video game controller contains the buttons: A, B, X, Y. When the player presses A their character Jumps. When the player press
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!