1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
Which administrative tool can you use to check your computer's health or troubleshoot problems with the operating system or soft
Fiesta28 [93]

Answer:

performance monitor

Explanation:

7 0
3 years ago
Read 2 more answers
John’s grandparents make wine for special occasions. They add a pinch of yeast to crushed grapes. Over time, this action release
luda_lava [24]
The answer is 1. A<span>lcoholic Fermentation

Hope that helped :)</span>
4 0
3 years ago
Read 2 more answers
Why is it generally a good idea to set the font size to at least 30 points in presentations?
vova2212 [387]
<span>It is generally a good idea to set the font size to at least 30 points in presentations </span><span>to ensure readability even from a distance.</span>
8 0
3 years ago
Read 2 more answers
What type of video games do you prefer buying?
Tamiku [17]
Mine is minecraft maybe
6 0
3 years ago
True or False?
patriot [66]

Answer:

False

Explanation:

You can not plagiarize, no matter what.

3 0
4 years ago
Read 2 more answers
Other questions:
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • Who invented the speaker?
    14·2 answers
  • VOTE!
    11·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!