1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
9

Give me 5 examples of Cyber Security

Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
8 0

Answer:

Firewalls, Antiviruses, Malware, Antispyware,

Explanation:

You might be interested in
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Select the phrases that apply to Java classes or methods.
oee [108]

Answer:

graficar una lista de entradas

graficar una lista de entradas

crear un nuevo objeto

condiciones de prueba

romper un ciclo

romper un ciclo

Explanation:

7 0
3 years ago
Where would you go to add fractions to a document in adobe indesign
prisoha [69]

Just select the fraction text and choose Open Type > Fractions from the Character panel menu.

5 0
3 years ago
Where might an awareness of Greek word origins be helpful?
devlian [24]
Greek word origins be helpful at a doctors offics
8 0
3 years ago
What is the default junk email protection in Outlook 2016?
Shtirlitz [24]
The answer to ur question is D
4 0
3 years ago
Read 2 more answers
Other questions:
  • What could prevent earmuffs from providing your ears good protection from noise?
    10·1 answer
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
    7·1 answer
  • When creating a presentation you should use a blank as a starting point?
    15·1 answer
  • What does it mean by MYRIAD of data?
    9·1 answer
  • What is the name of the FOLDER in which the file named "script" is contained?
    13·1 answer
  • What is HTML? (list down any 5 points)
    12·1 answer
  • Will give brainliest
    8·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
  • This might sound crazy! But please help.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!