Which of these is NOT a basic security protection for information that cryptography can provide?
A. authenticity
B. risk loss
C. integrity
D. confidentiality

Answers

Answer 1

Answer:

B. risk loss

Explanation:

Risk loss is not a basic security protection for information that cryptography can provide.

Answer 2

Answer:

Which of these is NOT a basic security protection for information that cryptography can provide?

B: Risk Loss


Related Questions

The number of semi skilled workers in an industry find themselves out of work, when improvements in technology render their jobs obsolete these workers experience?

Answers

Answer:

Structural unemployment is the correct answer.

Explanation:

Because there is a large amount of the semi-skilled labors or workers in the industries and they find ourselves out of work because of the new technologies that execute their jobs by which those workers become obsolete. So, that's why these workers face the experience of structural unemployment which creates a higher rate of natural unemployment.

Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread throughout a city. You want to tell the company president that this WAN will use a design for maximum uptime to all locations. Which of the designs should you use

Answers

Answer:

A  mesh network design

Explanation:

In designing local area networks, we can follow one of several network topologies, some of these are; bus, star, ring, star-ring hybrid, mesh, etc. In a mesh topology,  all the PCs are inter-connected to each other such that the computers do not send signals, they also act as signal relay to others within the network, considering that in this question scenario the goal is to acheive maximum uptime at all locations, a mesh design will be the best.

Final answer:

For a private WAN with maximum uptime, a mesh topology should be used due to its redundancy, with a full mesh offering the highest resilience. However, due to potential high costs, a partial mesh might be deployed, prioritizing critical connections and possibly using Quality of Service features for additional reliability.

Explanation:

If you are consulting for a company that needs a private Wide Area Network (WAN) with maximum uptime between its five locations spread throughout a city, the most robust design you should recommend is a mesh topology. A mesh topology provides each location with a direct connection to every other location. This redundancy means that if any single connection fails, the network communication can still proceed uninterrupted via alternative routes. For even greater resilience, you could consider a full mesh design, where each node has a direct connection to each other node, ensuring the highest level of redundancy and uptimes.

However, full mesh networks can be costly due to the high number of links and networking equipment required. An alternative with a balance of cost and resilience would be a partial mesh network, where not all systems are directly connected, but there are still enough interconnections to maintain communication in case one or a few links go down. It is essential to evaluate the criticality of each site to determine which connections are most necessary. Additionally, implementing Quality of Service (QoS) features and having backup links for the most critical connections will further enhance the network's robustness.

What can be used to restrict the driver packages installed by specific client computers, based on factors such as the BIOS, manufacturer, model, or OS edition used by the device?​

Answers

Answer:

Driver group

Explanation:

Driver group can be used to restrict the driver packages installed by specific client computers, based on factors such as the BIOS, manufacturer, model, or OS edition used by the device.

To lock down security settings on an individual system on a network, what would you use?

Answers

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

This option is available on windows. The local security policy information includes the domains, that trust login attempts to be authenticated.

 

You can add exceptions to your firewall rules so that anybody who uses your home computer can visit any web site except a chosen few web sites. True or false?

Answers

The answer would be true. Firewall rules define what kind of Internet traffic is allowed or blocked. ... A firewall rule consists of firewall services , which specify the type of traffic and the ports that this type of traffic uses. For example, a rule called Web browsing has a service called HTTP, which uses the TCP and port number 80.

Amazon Web Services and Microsoft Azure are some of the most widely used _______.

Answers

Answer:

Cloud computing platforms

Explanation:

The popular cloud computing platforms are used to provide storage, database, or integration services. with cloud computing you worry less about the technicalities involved in running cloud applications instead you will pay for the service and just do a little/fraction of the work and the cloud service provider will handle the rest for you.

When saving messages as drafts, it’s important to remember that your draft will not go live unless _______. Choose only ONE best answer. A. you have admin permissions or higher B. you have scheduled it or clicked Publish C. you have unlocked the draft for editing D. you have approval from a super-admin

Answers

Answer:

Option (b) is the correct answer.

Explanation:

"Drafts" is a folder of messaging software or mail software whose works are to save the message until the user does not want to send it. So to send the message from drafts, the user needs to edit the message first then he can able to send that message. The above question asks that how a user can send the draft message. Option b suggests that a user needs to click send to send the draft message.

Hence it is a right option while the reason behind the other option is invalid are as follows--

Option a suggests that a user needs admin permission to send this but if that is his account then no need for admin permission.Option c suggests to unlock the draft but the draft folder is not locked.Option d suggests to take permission from a superuser but that is not required.

Your Active Directory database has been operating for several years and undergone many object creations and deletions. You want to make sure it's running at peak efficiency, so you want to de-fragment and compact the database. What procedure should you use that will be least disruptive to your network?
A. Create a temporary folder to hold a copy of the database. Restart the server in DSRM. Run ntdsutil and compact the database in the temporary folder. Copy the ntds.dit file from the temporary folder to its original location. Verify the integrity of the new database, and restart the server normally.
B. Create a temporary folder and a backup folder. Stop the Active Directory service. Run ntdsutil and compact the database in the temporary folder. Copy the original database to the backup folder, and delete the ntds log files. Copy the ntds.dit file from the temporary folder to its original location. Verify the integrity of the new database, and restart the server.
C. Create a temporary folder and a backup folder. Restart the server in DSRM. Run ntdsutil and compact the database in the temporary folder. Copy the original database to the backup folder, and delete the ntds log files. Copy the ntds.dit file from the temporary folder to its original location. Verify the integrity of the new database, and restart the Active Directory service.
D. Create a temporary folder and a backup folder. Stop the Active Directory service. Run ntdsutil and compact the database in the temporary folder. Copy the original database to the backup folder, and delete the ntds log files. Copy the ntds.dit file from the temporary folder to its original location. Verify the integrity of the new database, and restart the Active Directory service.

Answers

Answer:

D.

Explanation:

Create a temporary folder and a backup folder. Stop the Active Directory service. Run ntdsutil and compact the database in the temporary folder. Copy the original database to the backup folder, and delete the ntds log files. Copy thentds.dit file from the temporary folder to its original location. Verify the integrity of the new database and restart the Active Directory service.

How many attendees are at a convention if 150 of the attendees are neither female nor students, one-sixth of the attendees are female students, two-thirds of the attendees are female, and one-third of the attendees are students?

Answers

Answer:

900

Explanation:

Let x be no. of attendees.

No. of students = x/3

No. of female students = x/6 = (1/2)(x/3) = (1/2) no. of students

This implies (1/2) of students are male. So,

No of male students = (1/2)(x/3) = x/6     .......eq (1)

No. of female attendees = 2x/3

No of male attendees = x - (2x/3) = x/3   ...eq (2)

Using eq(1) and eq(2)

No of male non-student attendees = (x/3) - (x/6) = x/6   ....eq(3)

No of male non-student attendees= 150 (Given in question)  ....eq(4)

Using eq(3) and eq(4)

=>   x/6=150

=>   x=150*6

=>    x=900 (Answer)

What FAA-approved document gives the leveling means to be used when weighing an aircraft?

Answers

Answer: Type Certificate Day Sheet (TCDS)

Explanation:

Type Certificate Day Sheet (TCDS) is a document of the Federal Aviation Administration popularly called FAA that documents the certification type and data of a product, which includes engine installation, wing loading, information about dimension, weight and balance, operating limitations, that is meant to also be available in the flight or maintenance manual as directed by FAA.

Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100
port on a Cisco switch?

a. Configure the negotiate disable interface subcommand
b. Configure the no negotiate interface subcommand
c. Configure the speed 100 interface subcommand
d. Configure the duplex half interface subcommand
e. Configure the duplex full interface subcommand
f. Configure the speed 100 and duplex full interface subcommands

Answers

Answer:

f. Configure the speed 100 and duplex full interface subcommands

Explanation:

An office manager must choose a five-digit lock code for the office door. The first and last digits of the code must be odd, and no repetition of digits is allowed. How many different lock codes are possible?

Answers

Answer:

6720 lock codes

Explanation:

The numbers to be chosen from are:

0 1 2 3 4 5 6 7 8 9

The odd numbers are five in number which are: 1 3 5 7 9

The even numbers are five in number which are: 0 2 4 6 8

If the first number is odd, therefore, it can be chosen in five ways

After the first number is chosen, there are 4 left odd numbers so the last number can be chosen in four ways.

There are 8 left numbers after they are chosen, so the second number can be chosen in eight ways

Third number can be chosen similarly, in seven ways

Fourth number can be chosen in six ways

Hence, the number of different combinations are:

5*4*8*7*6 = 6720 combinations

"When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address are the same. There have been no alerts sent via email or logged in the IDS. Which type of an alert is this?

Answers

This is false negative. To be marked for alert.

Explanation:

The network administrator or network engineer when he or she is analyzing IDS logs and founded the ip address is same on source and destination both in outside side.

So the either TCPIP address has to change to be scanned across the network. Since same IP address is same pinging rate will high and pinging the same workstation or desktop or laptop.

Alert will not generate because both tcpip address same and if pinging is success.  Ids logs generates based true negative, true positive and false positive will not generate any alert.

When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________. Group of answer choices value, value reference, value value, reference reference, reference

Answers

Answer:

Reference value.

Explanation:

Kevin created an app with Firebase that links the inventory of his business to his online store, which he is promoting on Google Ads. He wants to track sales from the app and needs to link his Firebase and Google Ads accounts.Which permissions will Kevin’s Google Account need to link Firebase to Google Ads?

Answers

Answer:

The permission that Kevin's Google account will need to link Firebase to google Ads is "Owner Role" in firebase

Explanation:

There are three primitive roles on IAM for firebase. They are; Owner, editor and viewer.

The viewer Role is for read-only actions

The editor role has all the viewer role permissions plus permission to change state and resources

The Owner role has all editor permissions plus the permissions below;

1) Manage roles and permissions for a project and all resources within the project.

2)Set up billing for a project.

3) Delete or restore a project.

Case-Based Critical Thinking Questions​Case 1: Tony’s Pizza & Pasta​Tony’s Pizza & Pasta restaurant uses an application to update and display menu items and the related price information.Which of the following statements assigns the daily special of lasagna to Tuesday? a.
strSpecial(5) = "rigatoni"

b.
strSpecial(6) = rigatoni

c.
strSpecial(5) = rigatoni

d.
strSpecial(6) = "rigatoni"

Answers

Final answer:

None of the provided options directly answers the question due to a misunderstanding or a potential typo since they involve assigning "rigatoni" instead of "lasagna" and none select Tuesday correctly based on zero-based indexing for days of the week in programming.

Explanation:

The question involves assigning the daily special of lasagna to Tuesday in a programming context, likely using an array to manage menu items by day of the week. Arrays in programming are zero-based, meaning the first element is at index 0. Therefore, Tuesday, being the second day of the week under conventional standards starting with Monday, would be at index 1 in the array. However, none of the given options directly mention "lasagna" or Tuesday explicitly, so we must infer based on standard array indexing and typical syntax for assigning values in programming languages like Python or Java.

Given the options, however, none correctly assigns "lasagna" to Tuesday due to the mix-up in the days and the item mentioned. The correct approach to assign "lasagna" to Tuesday would look something like strSpecial[1] = "lasagna", considering a hypothetical array strSpecial where days of the week are mapped to menu items. Since this option is not available, it points to a possible typo or error in the question's formatting.

________ (RFID) tags include an antenna, a decoder to interpret data, and the tag that includes information. The antenna sends signals. When the tag detects the signal, it sends back information. The tags can be used to keep track of anything including medications

Answers

Answer: Radio-frequency identification (RFID)

Explanation:

Radio-frequency identification (RFID) tags are defined as components that  are used for tracking of items. This device is based on technology of radio-frequency along with antenna and RFID(Radio-frequency identification) reader.

These tags are induced with electronically filled information in them and they tend to transmit and receive that information with help of antenna and IC(Integrated circuit) respectively . Detection of signal for sending and receiving of data is done by the tags that are linked with the object.It can detect pets, vehicles etc.

When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called?a. SAML
b. LDAPS
c. TACACS
d. SDML

Answers

C TACACS hope this helps

Which two peripherals are more likely to be external installations on a laptop rather than internal installations?
(a)Hard drive
(b)Microphone
(c)Webcam
(d)Wireless card

Answers

Webcam and wireless card, are the two peripherals that are more likely to be external installations on a laptop rather than internal installations are webcam and wireless cards.

(c)Webcam

(d)Wireless card

Explanation:

Some laptops come equipped with webcams as well. Wireless cards provide certain capabilities to a laptop depending upon their purpose. Hard drives and microphones are generally internally installed in almost all the laptops.

Most current board PCs presently accompany incorporated webcams incorporated with the showcase. While these inherent models are progressively advantageous to utilize, outer webcam models do have a few points of interest.

Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securing the installation. Currently, the design calls for a wireless network with many APs that are controlled by a single device, to allow centralized management. What type of APs will you be securing?

Answers

Answer:

Controller APs is the correct answer to the following question.

Explanation:

Because controller APs is the type of APs you can secure your wireless access point of the campus and any other organization. This is one of the better ways to protect or secure your AP that can be controlled by the individual device which permit the centralized management.

So, that's why the following option is correct.

Consider the following recursive method. public static void whatsItDo(String str) { int len = str.length(); if(len > 1) { String temp = str.substring(0, len – 1); whatsItDo(temp); System.out.println(temp); } } What is printed as a result of the call whatsItDo("WATCH")?

(A) WATC
WAT
WA
W
(B)WATCH
WATC
WAT
WA
(C)W
WA
WAT
WATC
(D)W
WA
WAT
WATC
WATCH
(E)WATCH
WATC
WAT
WA
W
WA
WAT
WATC
WATCH

Answers

Answer:

The answer is C.

W

WA

WAT

WATC

Explanation:

When the recursive method is called using whatsItDo("WATCH"), it works like this:

First the length of the argument is gotten and assigned to len.

Next if the length is greater than 1, execution enter the defined block

Inside the block, a substring is created from the beginning to less than 1 the end (0 to len - 1) and it is assigned to temp.

Then, the method is called again with whatsItDo("WATC").

The iteration continue and the next called method is whatsItDo("WAT"), followed by whatsItDo("WA"), followed by whatsItDo("W").

When whatsItDo("W") is called the condition will fail. So, the execution will pick up from:

whatsItDo("WA") where "W" will be displayed, then

whatsItDo("WAT") where "WA" will be displayed, then

whatsItDo("WATC") where "WAT" will be displayed, then

whatsItDo("WATCH") where "WATC" will be displayed.

And the program will finished execution.

Final answer:

The recursive method whatsItDo prints each substring of "WATCH" after each recursive call, resulting in 'WATC', 'WAT', 'WA', and 'W' being printed in that order, corresponding to option (A).

Explanation:

The recursive method described in the question prints a series of progressively shorter substrings of the original string "WATCH". This is because each recursive call to whatsItDo removes the last character from the string and prints the substring after making the recursive call. The method stops making recursive calls once it reaches a substring with a length of 1, and as the recursive calls return, it prints each of the substrings starting from the shortest to the second longest.

Thus, when whatsItDo("WATCH") is called, the output will be a series of substrings without the last character:

WATCWATWAW

This corresponds to option (A) as follows:

WATC
WAT
WA
W

When the ____ property of an object is set to False, the object will not appear on the form when the program starts.

Answers

Answer:

Enabled

Explanation:

the enabled property is found in visual basic integrated development environment, it determines whether the object or form element either appears or not when the program starts.

Which string displayed using the ls –l command in a Linux terminal indicates that group permissions are set to read and modify?

Answers

Answer:

The answer is -rw-rw-r--

Explanation:

This is a permission string which refers to read and write (modify) permissions to owner and group only and read only permission for all others.

There are three types of permissions: read (r), write(w), and execute(x).

In the above string, r stands for read and w stands for write permissions. Read (r) permission allows the contents of the file to be viewed.

Write (w) permission allows modification of the contents of that file. It gives permission to edit (e.g. add and remove) files.

The first dash "-" refers to the type of file. The next rw- define the owner’s permission to the file. so the owner has permission to read and write a file only. The next rw- refers to the group permission. The members of the same group have permission to read and write a file only just as the owner. The last r-- means that all other users can only read/ view the file. In the first rw- the "-" means to remove or deny access. This means owner is granted permission read and write the file only but he cannot execute (x) the file contents. 2nd rw- means the same but for group and lastly there are two "--" after r. The first "-" denies write access and second one denies execute access.

The ___ value is the number of time units a programmed timer is programmed to count before timed contacts change state.

Answers

Answer:

Preset Value

Explanation:

The preset value is actually the number of time unit a programmed timer is being programmed for counting before the timed contact changes the state.  And hence, its certainly the preset value the correct answer above. And remember the clock rate is defined by step function the time taken to reach 0 value from 1 is one time unit. Also, its the timed contact that changes the state, after the preset value is surpassed. And that is why its the timed contact, which means with fixed preset value.

How you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.

Answers

Answer:

Guest to host interaction means that, virtualized operating system is guest and computer system is host. The virtualized operating system is making interaction with computer by using its hardware resources such as storage and CPU, it is also known as host.

Explanation

To make sure the interaction between virtualized operating system and their hyper visors, following steps would be needed.

up to date software and security patches.Use host based firewallsInstall antivirusdisable unused virtual HardwareDisable unnecessary file sharing

It is also necessary to monitor the activities between guest and host.

Quickly see the original bill from the Pay Bills window, select the bill and click the ________ button.

Answers

Answer:

The answer is "Go to bill".

Explanation:

In the question given, the Quickbook Enterprise app is used to view the original bill from the payment account window easily. We simply click on the "Go to account" button to display payments.

When we click the bill button, a wizard or prompt will be provided.This prompt contains the payroll log, and the specifics of the old payments are shown in this prompt.

________ is defined as how we form impressions of and make inferences about other people. Attribution theory Social perception Social inference Social encoding

Answers

Answer:

Social Perception is defined as how we form impressions of and make inferences about other people.

Explanation:

Attribution theory is such theory in psychology which tells us that people determine the behavior of others with the help of their attitude, feelings or belief. For example, if he is not smiling today then he is sad.Social perception is defined as the way of forming impression about others so this is true in our case.Social inference tell us about the reasoning behind the social behavior of people on the basis of some facts.Social encoding is simply the translation of behavior or any other things into our thoughts or beliefs.

Yolanda is making a banner for a school pep rally. She cuts fabric in the shape of a parallelogram. The angle at the bottom left corner measures 80°. what The measure of the angle at the top left corner must measure?

Answers

Answer:

100° angle is the correct answer to the following question

Explanation:

In the following statement, a lady who is creating a banner for the school but that lady cuts the sheet of the fabric in parallelogram whose opposite sides are always parallel and the opposite angles also. Then, the angle of the bottoms is 80°. So, that's why the 100° is the angle that is the top left corner.

Answer:

100 (100% sure)

Explanation:

ThIS IS CoRrEcT

The muscle cells and nerve cells in a mouse look very different and serve very different functions in the mouse's body. These differences exist because the muscle cells and nerve cells in the mouse: have different genes. have different ribosomes. copy different genes. express different genes. have different chromosomes. use different genetic codes.

Answers

Answer:

Express different genes

Explanation:

Basically DNA is written into RNA which is later converted into proteins, gene expression involves the heritable data in a gene and DNA arrangement being made into a gene product like Protein. the cells in the muscle and nerves have different way of gene expression.

You are having difficulty uninstalling freeware a user accidentally installed while surfing the web. You look online and see the software is designed to work in an x86-based version of Windows. In which folder should you expect to find the program files for the software?

Answers

Answer:

Option (D) is the correct answer to the following question.

Explanation:

In the following question, some information is missing that is options are

'a. C:\Windows

b. C:\Program Files (x86)

c. C:\Program Files

d. It depends on the version of Windows installed.'

Because the Microsoft Windows Operating System has the their different versions of the operating system and these os has different types of functionalities and file system so the storage of the application data is different in all the versions of an MS Windows operating system. So that's why the following option is correct.

Other Questions
In the split labor market theory, the group that gains the most from discriminatory institutions is: For dinner, Carol consumes 250 grams of carbohydrate, 50 grams of protein, and 30 grams of fat. In addition, Carol decides that she wants a glass of wine with her meal. If she drinks one glass of wine containing 10 grams of alcohol, how many total kilocalories does she consume in this meal? a. 340 kilocalories b. 1,540 kilocalories c. 1,806 kilocalories d. 2,820 kilocalories Find x, y and z for the following triangle. Please show the steps with details, Thanks! Roberta is 25 years of age, healthy, and pregnant. Based on this information, her body is in ____ nitrogen balance. A. PositiveB. InverseC. NegativeD. Activated .. The Howe Co. stockholders equity account follows: Common stock (400,00 shares at $4par) $1,600,000 Paid in capital in excess in par 1,000,000 Retained earnings 1,900,000 Total stockholders equity $4,500,000 The earnings available for common stockholdes from this periods operations are $100,000,which have been included as part of the $1,9 million retained earnings. A. what is the maximun dividend per share that the firm can pay?(assume that legal capital includes all paid-in-capital) B. If the firm has $160,000 in cash, what is the largst per-share dividend it can pay without borrowing? C. Indicate the accounts and changes,if any,that will result if the firm pays the dividends indicated in parts A and B? D. Indicate the effects of an $80,000 cash dividend on stockholders equity. Environmental economists seek to implement a study to examine public preferences for alternative forest landscapes. Respondents are asked to choose one of several plans that depict environmental changes from the baseline condition of forests. Which nonmarket valuation method describes this study?a: Contingent Valuation Methodb: Averting behaviorc: contingent behaviord: choice experiment Why is earth considered an open system and a closed system Which structure(s) is/are primarily responsible for the release of catecholamines? What is the remainder of 428/19. I know it equals 22, but whats the remainder Identify the psychologist who is credited with originating the scientific study of forgetting. If crossing over and independent assortment ceased to occur,a. genetic variation would decline rapidly, with sperm or ova having the same alleles. b. sperm will always have the same alleles, but ova will always have different alleles. c. ova will always have the same alleles, but sperm will always have different alleles. d. sperm or ova would alternate between the types of alleles they will contain. 5) Linda picked a basket of apples. She gave half of the apples to a neighbor, then 10 apples to her mother, then half of the remaining apples to her best friend, and she kept the remaining 3 apples for herself. How many apples did she start with in the basket? I need help this is due this Wednesday on my college math class! ASAP!!! This needs to be shown full work for full credit!! Tim's Tacos sell 57 chicken tacos a night and 89 beef tacos a night for 3 weeks. How many of each kind of taco do they sell when the three weeks are up? Who is mainly responsible for analyzing the knowledge and work of newly hired unlicensed assistive personnel (UAP) before delegating a task? Professor Brody attempts to measure the relative contributions of inborn traits and social influences on sexual preferences and behavior patterns. Her research efforts best illustrate the interests of the ________ perspective. Which cellular component would be responsible for the classic shape of a red blood cell? If you deposit $1,000 in an account that pays 6% annual interest compoundedcontinuously, what will the balance be after five years? A participant seated in an otherwise dark room stares at the flickering of a lit candle and reports on her subjective experiences, such as the visual experience of the candle flickering and the hepatic sensation of warmth. The psychologist conducting this experiment is MOST likely to be _______, and the method being used is __________. wer choices The isosceles trapezoid is part of anisosceles triangle with a 46 vertex angle.Enter the measure of an acute base angle ofthe trapezoid. When using your portable radio, you must push the "press to talk" button and wait one second before speaking. This is essential to effective communication because your EMS system must use: Steam Workshop Downloader