1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
9

A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using

the CIS-20 Security Controls. He has indicated that your organization must restrict access to client machine's use of wireless so that machines with a vital business purpose can only be allowed on approved wireless networks and not allowed on other wireless networks. His question is this: which Implementation Group does this security control apply toward
Computers and Technology
1 answer:
Ymorist [56]3 years ago
3 0

Answer:

The answer is "implement on group 2 and group 3".

Explanation:

In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.

You might be interested in
What makes your microphone sound better?
aliya0001 [1]

Answer:

Try playing with its settings. (if it has any), Or maybe put a pop filter on the microphone to improve voice clarity. (can be an old sock), Please read some forum on the topic or better yet find out the manufacture(brand) of your microphone, and then read their recommendations.

Explanation:

8 0
3 years ago
If the algorithm does not have instructions for unanticipated results, the computer program will
bixtya [17]
ANSWER: The computer program will ✔ halt . A(n) ✔ recipe is an algorithm.

BRAINLIEST please and good luck!
7 0
3 years ago
What is the answer to this question?
Helga [31]

Answer:

LoadFactorLimit >=1

Explanation:

The maximum Load factor limit allowed is equal to 1. And it cannot be greater than 1. And as the load factor limit is reached, the HashSet size is increased. And hence, the correct condition statement for this question is as mentioned above.

Remember the Load factor = number of keys stored in a HashSet divided by its capacity. And its maximum value cannot be more than 1.

7 0
3 years ago
What are the disadvantages of using social media to communicate with colleagues?
yanalaym [24]

Answer:

The overall finding of the study is that this type of distraction can potentially decrease work performance and productivity, Increased Risk of Malware, Damaged Employee Productivity, Reduced Employee Relations, and Confidentiality and Company Image. Security. Using social media platforms on company networks opens the door to hacks, viruses and privacy breaches, Harassment, Negative exposure, Legal violations, Potential loss of productivity, and Wage and hour issues.

6 0
3 years ago
Read 2 more answers
During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?
Sladkaya [172]

Answer:

<em>During a traceroute, the router decreases the Time To Live values of the packet sent from the traceroute by one during routing, discards the packets whose Time To Live values have reached zero, returning the ICMP error message ICMP time exceeded.</em>

Explanation:

Traceroute performs a route tracing function in a network. It is a network diagnostic commands that shows the path followed, and measures the transit delays of packets across an Internet Protocol (IP) network, from the source to the destination, and also reports the IP address of all the routers it pinged along its path. During this process, the traceroute sends packets with Time To Live values that increases steadily from packet to packet; the process is started with Time To Live value of one. <em>At the routers, the Time To Live values of the packets is gradually decreased by one during routing, and the packets whose Time To Live values have reached zero are discarded, returning the ICMP error message ICMP Time Exceeded</em>

7 0
3 years ago
Other questions:
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • One reason for using social media is to develop social and professional contacts. True or False?
    9·1 answer
  • 1.    Design a circuit that when the binary input is 0, 1, 2, 3,4,5,6, and 7 the binary output is one greater than the input.  W
    13·1 answer
  • Assessing opportunity cost involves...
    6·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • All of these (except the ______) go unnoticed by the computer
    7·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    14·1 answer
  • An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.
    9·1 answer
  • Who knows songs that are sad,happy,excited, and calm
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!