A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer 1

Answer:

A posture assessment. :3


Related Questions

Explain what is Piaget and What is Cooperative problem solving.

Answers

Piaget maintained that opportunities for becoming less egocentric are more common when children discuss things with each other because then they must face the fact that not everyone has the same perspective on a situation.

hope it helps

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False

Answers

Answer:

the correct answer is true

Which of the following is not a view for interacting with a form object?
A. Datasheet view
B. Design view
C. Form view
D. Layout view​

Answers

question

Which of the following is not a view for interacting with a form object?

D. Layout view

hope it helps

Answer:

Layout view Layout view is a more visually-oriented view than Design view.

Match each tool or feature to the task it completes.

Answers

Answer:

the screenshot order is correct.

Explanation:

the gray one’s are right he just got them wrong before

What steps can be used to run the Accessibility Checker? 1 Click the tab. 2. Go to the group. 3. Click and then Check Accessibility. 4. The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities.

Answers

Answer:

file, info, check for issues.:)

Explanation:

The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

What is accessibility checker?

Your work is compared to a set of standards by the accessibility checker, which highlights any potential issues for users with impairments. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is. Making sure that the content you publish is accessible to users is the essence of accessibility.

Choosing File > Info. Choose "Check for Issues" Look into accessibility. Choose a problem from the Inspection Results. Review the How to Fix in the Additional Information, then edit your document as necessary. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is.

Thus, the Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

To learn more about accessibility checker, refer to the link below:

https://brainly.com/question/30012324

#SPJ5

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

Artificial intelligence (AI) and machine learning are especially important during which security information and event management (SIEM) task?

Answers

Answer:

hueiweke

Explanation:

Artificial intelligence (AI) and machine learning are especially important during analysis and report review security information and event management (SIEM) task. Thus, option (b) is correct.

What is management?

The term “management” refers to the act of managing. The management of the business activities. Management is the basis of art, science, and the profession. Management are they manage the organization. Management are based of the different functions are the step by step.

According to the security information and event management (SIEM) task. There are the artificial intelligence and the learning are the significant review in the information of the task in the management. There was the analysis of the past daily report.

As a result, the artificial intelligence (AI) and machine learning are especially significant during analysis and report review security information and event management (SIEM) task.

Learn more about on management, here:

https://brainly.com/question/29023210

#SPJ2

Your question is incomplete, but most probably the full question was.

A.) Packet capture.B.) Analysis and report review.C.) Data aggregation.D.) Log collection.

A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.

Answers

Answer:

A router

Sentence:

A(n) router is a network organization that centralizes user accounts, passwords, and access to resources.

What is voice recognition system ?​

Answers

Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

Explanation:

Answer:

Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

??????????????????? Help

Answers

ms office is a software, that would make the most sense.

Answer:

d) MS Office

Explanation:

Microsoft Office is a program. Think of it this way .... Your operating system is like the engine of your car.

more Or less?

Pick one and be rewarded!!!!!!!

Answers

Answer:

More

Explanation:

hope this is helpful

code hs spell it out 7.2.6

Answers

what do you mean can you say it more clear?

The programming question requires that we write a function that takes a string and returns every character in it but the first character.

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def end_of_word(myStr):

   #This returns every character in the string except the first

   return myStr[1:]

Read more about Python functions at:

https://brainly.com/question/13795586

In one to two sentences, describe how you would create a border around a group of cells.

Answers

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

1. What are the electronic hand tools presented in the video? 2. How many cleaning materials where used to maintain the tools? 3. Enumerate the steps in maintaining the hand tools presented in the video clip.

Answers

I don't think you can answer the question without a video

MyPlate was created to __________. A. To encourage Americans to eat the same quantity of food across the different food groups B. To be a visual tool for understanding a healthy diet C. To help Americans measure the amount of fat in their bodies D. To provide a reference for evaluating different types of cuisine Please select the best answer from the choices provided. A B C D.

Answers

Answer:

B

Explanation:

MyPlate was created to be a visual tool for understanding a healthy diet.

        -> MyPlate image is attached

A. To encourage Americans to eat the same quantity of food across the different food groups

   This is incorrect, MyPlate does not show the same amount of quantity for each food group.

B. To be a visual tool for understanding a healthy diet

   This is correct, MyPlate was created to be a visual guide of what a healthy diet might look like.

C. To help Americans measure the amount of fat in their bodies

   This is incorrect, MyPlate has nothing to do with body measurement.

D. To provide a reference for evaluating different types of cuisine

   This is incorrect, MyPlate had nothing to do with evaluating different types of food.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Answer:

the correct answer is b

Explanation:

edge 2022

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

What kind is a utility file that shrinks the size of a file

Answers

Answer: Compression

Explanation:

PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED


An automatic transmission is a mechanism that

A. automatically turns on your car

B. automatically turns off your car

C. selects the best gear for the situation

D. Connect your radio to air signals

Answers

Answer:

c. Selects the best gear for the situation.

Explanation:

A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Answers

A form is an access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk

Answers

Answer:

however they choose to display the facts as it isbut are willing to take the risk

what is the main circuit board inside the computer called?

Answers

Answer:

Motherboard is the main circuit board inside the computer.

Other Questions
Make d the subjest of the formula h=d/3+2 Jorge wants to find the height of the house, help him find it. why is high blood pressure known as the silent killer? plsss answer my questionits in the picture Which expression is equivalent? Thank you:) Anwere please?Thank you.. What were the issues of the 1876 presidential election? All maps lie flat,all flat maps lie . Explain. Write down 20 verbs in German with their translation100 points for this ANY KIND PERSON HERE?in our new situation. what are the things we already use before but we value more now a days to protect our self from virus, write your answer on space provided. ___1. __________________________ ___2.__________________________ ___3.__________________________ ___4.__________________________ ___5.__________________________ Jon performs the following calculation. (1) (2. 0) (3. 00) (4. 000). Which value from his calculation most strongly affects the number of significant figures in the answer? 1 2. 0 3. 00 4. 0. What was the importance of the Great Migration? #16 iMODELING REAL LIFE A public university charged $9200 for tuition and fees in the 2014-2015 academic year. This costincreased at a constant rate and reached $10,900 in the 2019-2020 academic year. Estimate the cost of tuition and fees in the2023-2024 academic year. The carbon dioxide that is used by plants ________1. Is combined with oxygen to make sugar molecules2. Is absorbed through the roots of plants3. Comes from the air4. Is actually a source of food As sworn officers of the court, prosecutors are required to base their decisions of whether to prosecute solely on ____________. how many feet in 13 miles, 176 yards? QUESTION 9The most popular intercollegiate sport for women in late-nineteenth-century America wasO A. basketball.OB.croquet.O C. soccerO D.volleyball. Solve for x and y. (Geometry) A piano teacher has 4 1/2 hours available to teach each night. One lesson will last 3/4 of an hour. How many lessons can the teacher schedule each night? was the patrick henry speech worth dying over