subject
Computers and Technology, 04.03.2021 01:00 srice6

1A.) What can cause a threat to a computing system? A. Nick scans his hard drive before connecting it to his laptop.

B. Julie turns off the power before shutting down all running programs.

C. Steven has created backup of all his images.

D. Cynthia uses a TPM.

E. Monica has enabled the firewall settings on her desktop computer.

1B.) Which step can possibly increase the severity of an incident?

A. separating sensitive data from non-sensitive data

B. immediately spreading the news about the incident response plan

C. installing new hard disks

D. increasing access controls

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 13:00
"in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y? "
Answers: 3
question
Computers and Technology, 21.06.2019 22:00
Match the steps of the process to julia's analysis. 1. analyze choices. current costs for making phone calls to foreign countries averages between five and ten cents a minute. 2. determine the goals. julia needs to reduce the cost of telecommunications without reducing her employees' ability to do their jobs. 3. gather data. the corporate computer network will be able to handle the increased traffic that will occur as a result of voip. 4. evaluate the decision. julia will have her it department set up voip in the smallest domestic office. 5. make the decision. julia will have employees document the benefits and problems that result from using the new technology.
Answers: 1
question
Computers and Technology, 23.06.2019 06:30
Martha is designing a single-player game. her manager suggests that she plan the design to incorporate future modifications. which principle of game design relates to planning for future modifications?
Answers: 1
question
Computers and Technology, 23.06.2019 19:30
Of the following pieces of information in a document, for which would you most likely insert a mail merge field?
Answers: 3
You know the right answer?
1A.) What can cause a threat to a computing system? A. Nick scans his hard drive before connecting...
Questions
question
Mathematics, 23.07.2020 01:01
Questions on the website: 13722367