1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
13

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra

nsmission, via the application of policy, education, training and awareness, and technology is known as ___________.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
8 0

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

You might be interested in
What is not true about contracts?
Brut [27]
If you sign a contract or official document with your non-dominant hand, you do not have to follow that agreement or set of rules
5 0
3 years ago
Read 2 more answers
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
Mila [183]

Answer:

(A)AES

Explanation:

WPA2 (Wi-Fi Protected Access 2) is a security protocol which was developed by the Wi-Fi Alliance in 2004. It was used to replace the security protocol of WEP(Wired Equivalent Privacy) and WPA.

Unlike the previous security protocol, WPA2 uses the Dvanve Encryption Standard (AES) instead of the RC4 stream cipher. WPA3 has been developed but it is not yet widely in use.

4 0
3 years ago
In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
PolarNik [594]

This process that would be considered in the above scenario is Data mining.

<h3>What is data mining?</h3>

Data mining is known to be the act or method of knowing more about data via;

  • Leaning raw data.
  • Finding patterns.
  • Forming models.
  • Testing those models.

Note that  It is a method that uses statistics, machine learning, and database systems and it will be good tool to be used in the scenario above.

Learn more about Data mining from

brainly.com/question/14776357

4 0
2 years ago
What is the main role of LDAP?
NISA [10]

Answer:

Run directory services

Explanation:

LDAP (Lightweight Directory Access Protocol) is an open protocol used to access some information, information that is stored in a network, the information is organized hierarchical structure, we could find some data like names, directories, and telephone numbers.

With other options, we can find DHCP to assign IP addresses and to resolve IP addresses to host names, we have the DNS.

7 0
3 years ago
The darker shadow of an eclipse is called the penumbra.<br><br> True<br><br> False
Kryger [21]
The correct answer for your  question is true, Hope this helps
8 0
3 years ago
Other questions:
  • "which part of an information system consists of the rules or guidelines for people to follow?"
    9·1 answer
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • 11.
    11·1 answer
  • Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
    9·1 answer
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
    13·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Services such as water, electricity, and phone communications are called:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!