1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
7

A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co

mputer in the finance department. The user was able to copy data containing bank account information and social security numbers. The user then destroyed the data by resetting the computer. The department manager was at lunch at the time and had enabled the lock screen to require a password to gain access to the computer. Which additional measure should the manager have taken to prevent data theft
Computers and Technology
1 answer:
netineya [11]3 years ago
7 0

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

You might be interested in
Hello guys please help me <br>list and identify the components of computer ​
attashe74 [19]

Answer:  A motherboard

A Central Processing Unit (CPU)

A Graphics Processing Unit (GPU), also known as a video card

Random Access Memory (RAM), also known as volatile memory

Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

7 0
3 years ago
Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
GalinKa [24]
A Motorcycle would be a good option or get a bike.
7 0
3 years ago
¿Es lo mismo hablar de tecnología que de computadora?
V125BC [204]

Translation:  

Is it the same to talk about technology as about the computer?

5 0
3 years ago
After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
liberstina [14]

Answer:

a, c, & e

Explanation:

7 0
3 years ago
The page that appears when you first open your Internet browser is the _____.
Leni [432]

Answer:home page

Explanation:

7 0
2 years ago
Other questions:
  • Which of the following assignment statements contains a LOGICAL error? I multiply two numbers when they need to be added I write
    9·1 answer
  • What is the part of the browser window that displays the content of the web page such as pictures and text called?
    10·1 answer
  • Which of these networks is primarily for posting and viewing photos?
    8·2 answers
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • A good practice when using public domain content is to
    7·1 answer
  • Please select the word from the list that best fits the definition
    13·2 answers
  • Please answer soon
    8·1 answer
  • What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-leve
    11·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!