1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
13

Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?

Computers and Technology
1 answer:
monitta3 years ago
8 0

Answer:

Computer Forensics

Explanation:

Your Welcome....

You might be interested in
Which is an example of withholding you might see on your pay stub
Bas_tet [7]
A withholding you might see on your pay stub can include a retirement savings or a health insurance payment.
3 0
4 years ago
Read 2 more answers
What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
igor_vitrenko [27]

Answer Explanation

There are many things to improve the security of business with the help of internet

  • the pillars of business depends upon the information and internet provide security to these information.
  • the computer or laptop which is used for business purpose are secure by internet
  • we use hardware and software firewalls to protect the PC or laptop.
  • we use antivirus to protect the system
  • for runing the computer we uses software firewalls
  • for protection purpose we use hardware firewalls

7 0
4 years ago
PLZ HELP WITH SPEED i need the answer<br><br> WILL GIVE BRAINLIEST
jeka57 [31]

Explanation:

1. register-true

2. line spacing

3. before text

4. first line

8 0
3 years ago
____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
k0ka [10]

Answer:

The correct answer to the following question will be Option A "Network Attached Storage (NAS)".

Explanation:

  • Network-connected storage is indeed a document-level data storage server based to a communications network providing information accessibility to a heterogeneous collection of users.
  • The NAS is experienced in supporting files by hardware, code or modification.

The other three option are not able to perform such type of tasks. Therefore, Option A is the right answer.

5 0
4 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Other questions:
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • By default, the Windows desktop displays
    6·1 answer
  • Line installers must complete a four-year university degree program in order to be hired.
    5·2 answers
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • 1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x &gt; y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
    12·1 answer
  • This the code from the last post I did
    8·1 answer
  • FCAPS is a network management functional model. FCAPS is an acronym that represents the focal tasks necessary to effectively man
    13·1 answer
  • A(n) _________ produces dynamic reports, supports alerts/rss functionality, and supports user subscriptions.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!