1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
PIT_PIT [208]

Answer:

Check Explanation (last paragraph, please).

Explanation:

The acronym "XML" simply stand for Extensible Markup Language and it is a programming language that is for coding infomation or data.

Extensible Markup Language(XML) is very acceptable and whenever one read or search a website that uses XML, it gives viewers good experience.

Piers can use XML to improve his website creations through the declaration of a namespace which has an integral part to a script element. The tags in XML does not have limitation like other languages. Also, Extensible Markup Language(XML) does not need to be updated all the time in as much as the website itself is being updated.

7 0
3 years ago
Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
wolverine [178]
I can solve it with Java. Here it is: 

areaOfSquare = stdin.nextDouble();
double sqrt = Math.sqrt(areaOfSquare);
if(Double.isNaN(sqrt)){
     System.out.print("INVALID");
} else {
     System.out.print(sqrt);
}
3 0
3 years ago
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
2 years ago
True or false: within a database, fields can be added, deleted and edited but never moved.
nata0808 [166]

Answer:true bra

Explanation:

6 0
2 years ago
Brad Smith works for GHI Firm. GHI firm is a registered Broker-Dealer in State A, B and C and a registered IA in State A. Brad i
Rashid [163]

Answer:

The correct answer is B. This is unacceptable because Brad is not registered in State B

Explanation:

Given:

Brad is a registered Investment Advisory Representative (IAR) in State A.

In the question, it's not stated that Brad is not registered in State B.

Setting up an office in State B is unacceptable because Brad is holding himself out as an IAR in State B and he is not registered as an IAR in State B.

Though GHI is a registered firm in State B, Brad also needs to be registered before setting up an office in other states.

8 0
3 years ago
Other questions:
  • What is the property of the Magnetic Lasso tool?
    6·2 answers
  • Five computers are connected to a switch in a star topology. what type of network is this?
    12·1 answer
  • Give a recursive implementation for the function: def is_sorted(lst, low, high) This function is given a list of numbers, lst, a
    10·1 answer
  • A local reaction will occur at the site of the exposure, such as irritations or damage to the skin, eyes or lungs true or flase
    14·1 answer
  • A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company n
    9·1 answer
  • Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
    12·2 answers
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • Write modified code that will generate a random number between 0 and 255 when a button is pressed and will write the number to t
    14·1 answer
  • What is bug in computer?​
    12·1 answer
  • What what do these two parts of the lift do ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!