Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement

Answers

Answer 1

Answer:

The answer is Deterrent

Explanation:

Deterrent controls are administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to govern an organization's security execution. Deterrent controls are used to ensure that external controls, such as regulatory compliance, are followed. I hope this helps! ^-^


Related Questions

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainiest if you can help

Answers

its expecting a "{} around a certain area.

hope this helps!!!

A(n) ________ portal offers a personalized, single point of access through a web browser to employees located inside and outside an organization.

Answers

A corporate portal offer employees (end users) that are located inside and outside an organization a personalized, single point of access through a web browser.

What is a web browser?

A web browser can be defined as a software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

In Computer technology, a corporate portal is a type of website that is typically designed and developed to offer employees (end users) that are located inside and outside a business firm or an organization a personalized, single point of access through a web browser.

Read more on website here: https://brainly.com/question/26324021

From Edmentum/Plato
You may be familiar with rubrics used for grading at your school. Take the idea of a rubric and create your own grading or evaluation form based on what you think is important for employers to evaluate about their employees. You may use online resources to gain a better understanding of work-based evaluation forms and rubrics to support your answer

Answers

Answer:

Given below is an example of an evaluation form for a workplace. It consists of various parameters that an employer would ideally consider when evaluating an employee’s work performance during a specific period, such as six months or a year. While evaluating an employee, an employer could circle or make a check mark on the following scales:

5 (excellent)

4 (good)

3 (average)

2 (below average)

1 (poor)

Parameters Excellent Good Average Below Average Poor

Appearance/Grooming 5 4 3 2 1

Attendance 5 4 3 2 1

Communication Skills 5 4 3 2 1

Coordination 5 4 3 2 1

Initiative 5 4 3 2 1

Working in a group 5 4 3 2 1

Creativity 5 4 3 2 1

Problem-solving Ability 5 4 3 2 1

Punctuality 5 4 3 2 1

Overall Work Attitude 5 4 3 2 1

Explanation: edmentum answer

Question 13 of 20
To find out what information people are posting about you online, it is
important that you closely monitor:
A. the social media websites you participate in.
B. your text records.
C. your insurance records.
D. your phone records.

Answers

Answer:

A. the social media websites you participate in.

Explanation:

To know what information people are posting about you online, it is important that you closely monitor your account in social media.

List some actual physical or psychological hazards that digital technology can inflict on people.

Answers

Answer:

Social media and mobile devices may lead to psychological and physical issues, such as eyestrain and difficulty focusing on important tasks.

...

Eyestrain

screen time.

screen glare.

screen brightness.

viewing too close or too far away.

poor sitting posture.

underlying vision issues.

8.
Which anti-theft strategies can a person or company put in place to protect their
computer devices from being stolen? Name any TWO strategies.

Answers

Answer:

Track your device - Get a protection app that includes tracking, lockdown, and wipe features. Apps such as Lookout, AVG, and Avast may already be pre-installed on your device (Android's Device Manager; Apple's Find My iPhone; and BlackBerry Protect).

To help, however, your software must be activated, so get it going and learn how to use it.

Get the hardware specifics - Paperwork is not everyone's favorite thing, but police reports require a substantial amount of detail. So, give your device's serial and model numbers a name. Note the MAC address and computer name. The IMEI number of your cell phone should also be written down. This data can be used for tracking.

I hope this helps you

:)

What type of unique control interface is used for connection to third-party software.

Answers

Answer:

an API.

API means Application programming interface. It is used for 2 programs to, "talk" to each-other through a web database.

I hope this helps! Have an awesome day!

Answer:

API is the unique control interface you seek.

Explanation:

________ is the development of web pages in a manner that is friendly to search engine spiders. a. SEM b. SEO c. PPC d. SEP

Answers

Answer: The answer is B. SEO

PivotCharts display data series, categories, data markers, and axes just as standard charts do. True False

Answers

PivotCharts display data series, categories, data markers, and axes just as standard charts do is a True statement.

What does a pivot chart display?

PivotCharts is known to be a kind of chart that shows data series, categories, data markers, and axes as if they are standard charts.

Here, a person can also change the chart type and use any other options such as titles, the legend placement, etc. The default chart type for a PivotChart is known to be a 2-D Line chart.

Learn more about  PivotCharts from

https://brainly.com/question/20029794

When coding prolonged services codes, they are to be reported alone without an E/M service code. True False

Answers

Answer:

True.

Explanation:

The work is included in the book. Hope this helpex

The best way to handle a problem is to ______.
a.
wait for someone to notice the problem
b.
avoid the problem so you don’t get blamed
c.
take care of the problem as soon as someone asks you
d.
take care of the problem as soon as you notice it

Answers

Answer:

D. take care of the problem ad soon as you notice it

Find 5 consecutive odd integers if the sum of the first 3 numbers is 7 more than the sum of the last two

Answers

Answer:15, 17, 19, 21, 23

Explanation:

I bet it’s right

what is used to create a vector image

Answers

Illustrator is an application made by Adobe that is used to create vector images. Because vector images are the native format, vectorizing images within Illustrator is fairly straightforward.

Illustrator is an application made by Adobe that is used to create vector images. Because vector images are the native format, vectorizing images within Illustrator is fairly straightforward.

The banner on the front page of a newsletter that identifies the publication is the:.

Answers

Answer:

Nameplate

Explanation:

The banner on the front of a newsletter that identifies the publication is its nameplate.

It is the responsibility of a manager to understand the company’s IT architecture and corresponding infrastructure so that they can do which of the following? Choose the appropriate IT infrastructure components. Select the correct wireless provider. Ensure a rigid IT structure. Make realistic use of IT and know what to expect from IT. Limit future business options.

Answers

It is the responsibility of a manager to understand IT architecture and corresponding infrastructure so that he can: D. Make realistic use of IT and know what to expect from IT.

What is IT?

IT is an acronym for information technology and it can be defined as a set of information systems (IS) or computer systems, that are typically used to collect, store, and process data, as well as for the dissemination of information, knowledge, and distribution of digital products in a business firm.

This ultimately implies that, an information technology (IT) interacts with its environment by receiving, processing and storing data in its raw forms and information in a usable format.

In conclusion, it is very important and essential that a manager understands an IT architecture and corresponding infrastructure so that he can make realistic use of information technology (IT) and know what to expect from information technology (IT).

Read more on information here: brainly.com/question/25885448

4.
Give the name of a non-portable device that is suitable for creating documents
and browse the web?
(1)

Answers

Answer:

Desktop Computer.

Desktop computers is a non-portable device that is suitable for creating documents and browse the web.

What is a Desktop computer?

A desktop computer is a piece of personal technology made to sit on top of an ordinary office desk.

It links to input devices like the monitor, keyboard, and mouse that users use to interact with a computer's actual hardware.

Desktop computer: a laptop that can fit on or under a desk and is intended to be stationary. Usually, it has a tower, keyboard, mouse, and monitor (system unit).

The desktop is the virtual workspace offered by Microsoft Windows that resembles a real desktop. A work space and taskbar are included. The workspace could encompass several displays.

Desktop computers are a non-portable device that work well for word processing and web browsing.

Thus, the non-portable device is Desktop computer.

For more details regarding Desktop computer, visit:

https://brainly.com/question/29130374

#SPJ2

The defines a display's width relative to its height

Answers

Answer:

Aspect Ratio

Explanation:

The Aspect Ratio defines the display's width relative to height.

Two common display Aspect Ratios are:

16:9 - usually used in monitors, phone screens. wide

4:3 - usually used in laptops, monitors, compact

A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the United States. The program is intended to combine county data sets and then process the data. Which of the following is most likely to be a challenge in creating the program?
i. A computer program cannot combine data from different files.
ii. Different counties may organize data in different ways.
iii. The number of counties is too large for the program to process.
iv. The total number of rows of data is too large for the program to process.

Answers

The option that is most likely to be a challenge in creating the program is Different counties may organize data in different ways.

What is Pollution?

Pollution is known to be a kind of bringing in of harmful materials into an environment.

These harmful things are known as pollutants. Pollutants are known to be natural and artificial that is they are created by human activity, such as trash or runoff produced by factories, etc.

Learn more program from

https://brainly.com/question/1538272

If you wanted to find the greatest number in a series of numbers, you would use the _____ function. Please help!
A. Sum
B. Max
C. Min
D. Average

Answers

When you wanted to find the greatest number in a series of numbers, you would use the Max function.

What is Max function?

The MAX function is known to be the function that is said to often brings back the biggest numeric value in the data that were given.

Note that if a person needs to find the greatest number in a series of numbers, you would use the Max function as it is the one that can help you to do that work.

Learn more about Max function from

https://brainly.com/question/82347

#SPJ5

You bought a laptop assuming it had application software loaded so you could use it right away, but it did not. What quality consideration did the laptop not meet

Answers

The quality consideration that this laptop did not meet is: fitness for use.

What is a laptop?

A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is working.

In this scenario, the laptop you purchased didn't have preinstalled software applications that you could use right away. Thus, we can conclude that the laptop is not fit for use because it didn't meet the quality consideration.

Read more on a laptop here: https://brainly.com/question/26021194

I Will Mark Brainliest For Correct answer!!
a specific type of data stored for a record

options:

Table


Field


Cell

Answers

Explanation:

option B. Field

if this helps you then please make me brainlist

In the communication process model, 'decoding the message' occurs immediately: Group of answer choices before the sender forms the message. after the receiver receives the message. after the sender forms feedback of the original message. after the receiver transmits the message. before the receiver receives the message.

Answers

According to the communication process model, decoding is the interpretation of the symbols or signs that arrive in a message and it occurs after the receiver receives the message.

What is the communication process model?

It is a model that is based on the communication process and the production of the meaning of a message, where two processes actively intervene, that of emission and reception, which are different.

The sender performs a coding operation to convey an idea, that is, the message is made up of a series of different types of organized signs.

On the other hand, this message is decoded by the receiver according to its own circumstances, that is, the receiver transforms the symbolic code sent by the sender into ideas.

Therefore, we can conclude that according to the communication process model, decoding is the interpretation of the symbols or signs that arrive in a message and it occurs after the receiver receives the message.

Learn more about communication process model here: https://brainly.com/question/1819139

The assignment operator ____________. a. is a binary operator b. has left-to-right associativity c. is most often represented by a colon d. two of the above

Answers

The assignment operator is a binary operator.

What is a binary operator?

A Binary operators is known to be those operators or people who work with two operands.

Note that the binary operators are said to be subdivided into:

ArithmeticRelational LogicalAssignment operators

Learn more about binary from

https://brainly.com/question/21475482

If you wanted to connect two networks securely over the Internet, what type of technology could you use

Answers

Answer:I would say a VPN ( Virtual Private Network )

Explanation:

A VPN is a normally a "secure" way to connect to the internet using different protocols like IPSEC PPTP IKEv2, etc.

What is the basic facilities, services, and installations needed to keep a
community or society functioning.

Answers

Answer:

transportation and communications systems, water and power lines, and public institutions like schools, post offices, and prisons.

Explanation:

Outline various methods of collecting data

Answers

Answer:

interviews

observation

questionering

Soa contains a lot of benefits, but _________ is not considered one of them.

Answers

SOA contains a lot of benefits, but been hard to handle is not considered one of them.

What is Service Oriented Architecture (SOA)?

The  Service Oriented Architecture  is known to be where all parts are set up to be services.

They are said  to be Easy to handle new version for subset of users and one can easily get back from mistake in one's design.

The SOA characteristics are:

Their Services are self-contained and modular.Their Services support interoperability.Their Services are loosely put together.

Learn more about  Service Oriented Architecture from

https://brainly.com/question/14835966

There are dash types of symbols

Answers

Answer:

logo , pictogram, ideogram, icon, rebus, phonogram and typogram

Explanation:

they are forty symbols

Tasha grew up helping her uncle work on cars in his auto repair shop and developed into an excellent auto technician. Because of stereotypes regarding women in this field, she is interested in finding a shop that minimizes gender discrimination and gender role inequalities. Tasha wants to work for a company that highly values gender egalitarianism.
A. True
B. False

Answers

Answer A. True

Explanation:

The color shown here, a pure green, is most likely to have which RGB value?
A. 255, 0, 0
B. 0,0,0
O C. 0, 0, 255
O D. 0,255, 0

Answers

Answer:

D

Explanation:

Because on the RGB, green is in the middle, so since this color is pure green, it will be D.

The color shown here is green, which is most likely to have which RGB value is 0,255, 0. The correct option is D.

What are RGB values?

The higher the RGB value, the brighter the color, so the 150 would be brighter when comparing 50 to 150. Whereas the 50 would darken the color. RGB values simply indicate the intensity of red, green, and blue.

RGB values are simply the sum of three different numerical values representing red, green, and blue on a scale of 0 to 255.

You can create any color perception by combining light from these three base colors. However, such a color palette does not exist. RGB does a good job of covering a large portion of the color gamut, but not all of it. The human eye is more sensitive to green, which is why we don't use RYB.

Therefore, the correct option is D. 0,255, 0.

To learn more about RGB values, refer to the below link:

https://brainly.com/question/17101647

#SPJ2

Other Questions
A colon can show a connection between two clauses. true false? What is the unit of measurement used for Electric Potential difference? Molly is having her birthday party at Pizza Party Palace. The costs involved are listed below. Pizza Party Palace requires a 10% deposit prior to the date of the event. If the deposit has been paid, how much is still owed for Molly's party?Party Prices Food & Drink $250 Game Tokens $100 Other $70 A. $84 B. $336 C. $378 D. $42 In professional tennis, the Grand Slam tournaments are the four big tournaments that take place in the same order each year: the Australian Open, the French Open, Wimbledon in England, and the US Open. Also known as the Majors, they are the most prestigious events in pro tennis. Serenas first Grand Slam win kicked off a long string of successes. From 1999 to 2018, Williams won a total of 23 Grand Slam singles titles on her own, plus numerous doubles tournaments with a tennis partner. From 2002 to 2003, she completed her first Serena Slam, meaning that she won all four Grand Slams in a row. What can you conclude about Williams based on this information?A Serena plays tennis well alone and plays other sports with a team.B Serenas first Grand Slam win was actually her only Grand Slam.C The Serena Slam is a sign that Williams dominated the sport of tennis internationally.D Serenas success as a tennis player was brief but intense. find the value of x and y in the triangle. 45-45-90. please help!! even if you can only do one :(( find the value of x y and z in the rhombus below Need Help ASAP PLEASE). Read the passage. Then answer the question. " The Reunion" What impact does the extended dog metaphor have on the tone of " Reunion "? Use evidence from the text to support your response. (Your response should be at least one paragraph). ( Do Not Repost Someone Else's Answer From Brainly Or Any Other Websites Please). Extremely Need Help. Will Mark Brainliest if answered correctly. Which solution is more diluted? solution 1: 1000 ml of water and 60g of salt solution 2: 500 ml of water and 60g of salt. Please help me please Nancy pays 30% of her $3100 salary in taxes. How much money does she have left after paying the tax? The area of a square is 289 centimeters squared. What is the perimeter? Is the number 501evenly divisible bythe number 3?Yes or no When pieces of soil are eaten and digested by worms they come out with a higher mineral content. These are known as___________.A. aquifersB. siltC. castingsD. aerates Publicly traded Yankee bonds must a. None of the options b. Meet the same regulations as Eurobonds if sold to Europeans c. Meet the same regulations as Samurai bonds if sold to Japanese d. Meet the same regulations as U.S. domestic bonds Describe and explain the characteristics and causes of Pearl Harbor during WWII. How did this event evolve? PLEASE HELP! no robots please The cheerleaders from Newberg High School are doing a giftwrapping fundraiser at a clothingstore. Yesterday, they wrapped 26 small clothing boxes and 39 large clothing boxes, using atotal of 468 feet of wrapping paper. The day before, they wrapped 28 small clothing boxesand 39 large clothing boxes, using a total of 480 feet of gift wrap. How much paper does ittake to wrap each size of box?Each small box usesfeet of paper and each large one usesfeet. On Tuesday, Jaheim and three of his friends ate dinner at a restaurant where meals cost $12 per person, but are 25% off every Tuesday. The tax on their meal was 8%, and they left a tip that was 20% of the pre-tax price. Note that taxes are calculated based on the discounted cost of the meal before adding a tip, and tips are calculated based on the discounted cost of the meal before adding tax. Part A. Enter an expression that can be used to find the cost of one persons meal, not including tax or tip, on a Tuesday. Part B. How much did the four friends spend in all on dinner? Round your answer to the nearest penny Is this story told in first person or third person? How do you know? Can you help please jjjjujjjjjjjhhhhhhhhhhhh WILL GIVE BRAINLIEST IF CORRECT PLEASE ANSWER!!!!The figure below is a square, Find the length of side x in simplest radical form with a rational denominator.