1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
9

What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?

Computers and Technology
1 answer:
motikmotik3 years ago
8 0
<span>Actually dod requires a digital type of authentication and a secure password inorder to access sensitive data on mobile devices and email, which may in the form of two step authentication code, then in the form digital phone calls, and then in the form of alphanumeric passwords and finally in the form of finger prints authentications or face recognition verification..</span>
You might be interested in
You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
ch4aika [34]
C. Copy which you can access by Ctrl C then paste with Ctrl V
3 0
4 years ago
Read 2 more answers
Write an expression that whose value is the fifth character of the string name.
Anuta_ua [19.1K]
Int j;
j="name"[4];
//   you   could  do
j=0;   //  since name   has four letters  the fifth  character is the terminating 0
now  if the string  name is  name
you   could do
j=name[4];  // or even    4[name] 

5 0
3 years ago
Which of the following tasks will save a file over top of itself, using the same filename? A. Reload B. Save C. Save As D. Expor
MrRissso [65]

Answer:

B. Save is the correct option.

4 0
3 years ago
An example of cooler red is
BARSIC [14]

apple, stop sign, fire truck, stop light... ect

6 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Other questions:
  • Angela wrote some lines of code that she wants to test. She will need to use __________. IDLE open source a prompt a file path
    15·2 answers
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    8·1 answer
  • What systemctl command configures a unit to start the next time the computer boots?
    10·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th
    9·2 answers
  • Toshiba Corporation makes computer chips. Toshiba Corporation would be classified as a A. merchandising company. B. manufacturin
    15·1 answer
  • When a primary key combines two or more fields, it is called a ____ key?
    5·1 answer
  • Which command should you select to track changes in a document?
    9·2 answers
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
  • What are the advanced file and folder search commands?PLEASE GUYS ITS IMPORTANT
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!