1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
7

A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co

mputer in the finance department. The user was able to copy data containing bank account information and social security numbers. The user then destroyed the data by resetting the computer. The department manager was at lunch at the time and had enabled the lock screen to require a password to gain access to the computer. Which additional measure should the manager have taken to prevent data theft
Computers and Technology
1 answer:
netineya [11]3 years ago
7 0

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

You might be interested in
DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
otez555 [7]

Answer:

D) can access main memory at the same time as the main CPU

Explanation:

DMA is short for Direct Memory Access, these controllers allow the device to transfer data directly to and from the memory modules without interfering with CPU processes. Therefore it can access main memory at the same time as the main CPU. Thus freeing up CPU processing power for other tasks while also retrieving the data necessary.

8 0
3 years ago
Give 15 examples of copyright and trademarks that we come in contact with everyday. (Doesn't hve to be 15 could be 3 or 5) PLEAS
oksano4ka [1.4K]
Roads, trading, Government, water systems,
6 0
3 years ago
Which approach is ideal for ensuring that a Webpage is maintained and does not appear neglected to users?
Greeley [361]

Answer:

D

Explanation:

I think putting hyperlink in essential pages is a good idea as it may guide a user

8 0
3 years ago
The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
Darya [45]
The "transport" layer of the OSI model performs a series of miscellaneous functions
Machine function also called miscellaneous functions—influence. positive functions on the machine, such as diverting the spindle rotation and coolant on and off, the path action of the tool, and the program beheading.
7 0
3 years ago
Jaboooo helloooo are u there
Fed [463]
?????????????????????
8 0
3 years ago
Read 2 more answers
Other questions:
  • To display or distribute information from a database, programmers or database administrators create ___ .
    12·1 answer
  • Multiple systems try to send data at the same time. The electrical impulses sent across the cable interfere with each other. Wha
    15·1 answer
  • Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in
    5·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • You will be creating a quiz grading program. You will compare the student's answers with the correct answers, and determine if t
    15·1 answer
  • My mom hid my laptop and now I can't find it​
    9·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
  • Please could you help me
    6·2 answers
  • What distinguishes Accenture as a holistic provider of Extended Reality (XR) services?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!