subject

CCTCOM O Mandatory Access Control (MAC)
15. The encryption and protocols used to prevent unauthorized access to data are examples of which type of access control?
1 pc
O Administrative
Technical
Physical
Embedded
16. If you are setting up a Windows 10 laptop with a 32Gb hard drive, which two (2) file system could you select (select 2)
HPES
NTES
ADES

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 19:30, bstine6678
When creating a presentation in libre office impress, where does the editing of slides take place? a. the slides panel b. the center panel c. the tasks panel, under the masters pages tab d. the tasks panel, under the layouts tab
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, Arealbot
To check spelling errors in a document, the word application uses the to determine appropriate spelling. internet built-in dictionary user-defined words other text in the document
Answers: 1
image
Computers and Technology, 24.06.2019 08:30, colebuug9
Aconsumer would pay an extra they used the rent to own program to buy the computer, rather than using cash. for all of the items, is the cheapest option over the life of the contract. the most expensive overall option is to use purchase the item.
Answers: 2
image
Computers and Technology, 24.06.2019 09:40, anyar
Healthy study habits are best described as
Answers: 1
You know the right answer?
CCTCOM O Mandatory Access Control (MAC)
15. The encryption and protocols used to prevent unau...

Questions in other subjects: