Question and answer
1. Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Question
Asked 60 days ago|12/6/2022 5:09:44 PM
Updated 60 days ago|12/6/2022 5:33:49 PM
3 Answers/Comments
f
Get an answer
Original conversation
User: 1. Password procedures, information encryption software, and firewalls are examples of measures taken to address:

Weegy: Password procedures, information encryption software, and firewalls are examples of measures taken to address Information and cyber threats.
Score 1

User: 2. Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as:

Weegy: Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as Malicious code.
Score 1

User: 4. Which of the following statements is NOT true about peer-to-peer (P2P) software?

Weegy: P2P networks are only found in homes or small businesses. -is not true about peer-to-peer (p2p) software.
Score 1

User: 4. Which of the following statements is NOT true about peer-to-peer (P2P) software?

Weegy: P2P networks are only found in homes or small businesses. -is not true about peer-to-peer (p2p) software.
Score 1

User: 6. Indicators of potential workplace violence:

Weegy: Indicators of potential workplace violence can be managed and treated if recognized.
Score .9627

User: 7. The potential for an unwanted outcome resulting from an incident, event, or occurrence is:

Weegy: The potential for an unwanted outcome resulting from an incident is Risk.
Score 1

User: 8. Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as:

Weegy: Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as: SOCIAL ENGINEERING.
Score .9934

User: 9. Controlling doors and other entrances is an example of a measure taken to address:

Question
Asked 60 days ago|12/6/2022 5:09:44 PM
Updated 60 days ago|12/6/2022 5:33:49 PM
3 Answers/Comments
New answers
Rating
3
Controlling doors and other entrances is an example of a measure taken to address Access and security control threats.
Added 60 days ago|12/6/2022 5:32:14 PM
This answer has been confirmed as correct and helpful.
3
Controlling doors and other entrances is an example of a measure taken to address Access and security control threats.
Added 60 days ago|12/6/2022 5:32:44 PM
This answer has been confirmed as correct and helpful.
3
[Deleted]
Added 60 days ago|12/6/2022 5:33:49 PM
Deleted by Jerrald@22 [12/6/2022 5:33:51 PM]
Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
10. An unlawful or unauthorized acquisition, by fraud or deceit, is known as a:
Weegy: An unlawful or unauthorized acquisition, by fraud or deceit, is known as diversion. User: 11. When addressing a suspected intruder, it is best to: Weegy: When addressing a suspected intruder, it is best to: Use open-ended questions when asking the person the purpose of his/her visit. User: 12. TRUE OR FALSE: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance. Weegy: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance. TRUE. User: 13. When employees collect or handle personally identifiable information (PII), they should: Weegy: When employees collect or handle personally identifiable information (PII), they should: Apply the 'need to know' principle before disclosing PII to other personnel. User: 15. TRUE OR FALSE: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code. Weegy: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code. TRUE. User: 14. 6.TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations. Weegy: Bomb threat checklists are extremely valuable and should be made available at all workstations. TRUE. User: 1. A toxic accident occurs in your neighborhood. Several adults, teenagers, and small children are present. Which group, if any, would likely be most severely affected? Weegy: A toxic accident occurs in your neighborhood. Several adults, teenagers, and small children are present. The small children would likely be most severely affected. User: 2. Formal mutual aid agreements with surrounding jurisdictions are seldom if ever needed, since everyone is ready to pitch in when an incident occurs. Weegy: Formal mutual aid agreements with surrounding jurisdictions are ... (More)
Question
Not Answered
Updated 60 days ago|12/6/2022 6:10:37 PM
1 Answer/Comment
The Occupational Safety and Health Act is intended to assure, so far as possible, safe working conditions.
Added 60 days ago|12/6/2022 6:10:37 PM
This answer has been confirmed as correct and helpful.
15. The analysis of a situation to determine the level of risk inherent in that situation is called:
Weegy: The analysis of a situation to determine the level of risk inherent in that situation is called risk assessment. User: 16. The five phases of a hazardous material's life does not include production, transportation, storage, elimination, and disposal. Weegy: The five phases of a hazardous material's life does not include production, transportation, storage, elimination, and disposal. FALSE. User: 17. Under EPCRA, Local Emergency Planning Committees (LEPCs) are charged with the responsibility to: Weegy: Under EPCRA, Local Emergency Planning Committees (LEPCs) are charged with the responsibility to develop an emergency plan to respond to hazardous materials incidents. [ ] User: 18. When treating a household incident involving exposure to a poison, your most reliable source of advice and expertise is: Weegy: When treating a household incident involving exposure to a poison, your most reliable source of advice and expertise is the product's label. User: 19. Existing landfills are generally considered sufficient to serve as the sole means of disposing of the Nation's waste for the foreseeable future. Weegy: Existing landfills are generally considered sufficient to serve as the sole means of disposing of the Nation's waste for the foreseeable future.FALSE. User: 20. The success of good site operations and the ability of employees to respond during emergencies is: Weegy: The success of good site operations and the ability of employees to respond during emergencies is: Initial and annual refresher training. User: 21. The presence of hazardous materials can always be detected by the sense of smell. Weegy: The presence of hazardous materials can always be detected by the sense of smell. FALSE. User: 22. A chemical that, in relatively small amounts, produces injury when it comes in contact with skin tissue is known as: Weegy: A chemical that, in relatively small amounts, produces injury when it comes in contact with skin tissue is ... (More)
Question
Not Answered
Updated 60 days ago|12/6/2022 6:06:31 PM
1 Answer/Comment
The tendency of chemicals to become more concentrated as they move up the food chain is known as: Biomagnification.

Added 60 days ago|12/6/2022 6:06:31 PM
This answer has been confirmed as correct and helpful.
37,287,335
questions answered
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
Popular Conversations
your license will be suspended for 90 days if you accumulate
Weegy: Your license will be suspended for 90 days in florida in you accumulate 18 points within 18 months. User: if ...
2/5/2023 12:35:59 AM| 5 Answers
what do constructivist educators believe about the learning process
Weegy: Constructivist educators belief about the learning process is that: learning is a process of building on what ...
2/3/2023 10:01:31 PM| 5 Answers
What event brought the United States into world war II?
Weegy: The attack on Pearl Harbor brought the U.S. into World War II. User: What was the policy designed to give ...
2/3/2023 8:01:35 PM| 5 Answers
how many people were executed for witchcraft in salem by 1693
Weegy: 20 people were executed for witchcraft in Salem by 1693. User: why did the salem witch trials end Weegy: The ...
2/2/2023 12:31:44 AM| 4 Answers
georgia was intended to be a second chance for what group of people
Weegy: Georgia was intended to be a second chance for: debtors to the English government. User: which civilization ...
2/1/2023 9:12:22 PM| 4 Answers
why was rhode island founded
Weegy: Rhode Island was founded as an haven for those who disagreed with Puritan beliefs. User: which colony was ...
2/1/2023 9:05:36 PM| 4 Answers
How can hypertension be prevented? A. balanced diet B. regular ...
Weegy: All of the above. Balanced diet, regular exercise and healthy weight are ways that hypertension might be ...
2/1/2023 12:50:03 PM| 4 Answers
Sympathy drives disconnection, and empathy drives connection. Which ...
Weegy: Feel sorrow or sadness for the other person- is NOT one of the four qualities of engaging with empathy. User: ...
1/26/2023 4:28:59 AM| 4 Answers
what is 6 3/8
Weegy: 6 + 8 = 14 User: 6 •/• 3/8 Weegy: 14 ? [3 + (8 ? 2)] = 14 - (3 + 6) = 14 - 9 = 5 User: what is 6÷3/8 ...
1/31/2023 3:35:57 AM| 3 Answers
4 2/3 and 11 1/4
Weegy: 11 + 3 = 14
1/31/2023 2:11:30 AM| 3 Answers
S
L
Points 279 [Total 279] Ratings 0 Comments 279 Invitations 0 Offline
S
L
P
L
P
R
Points 195 [Total 5798] Ratings 1 Comments 185 Invitations 0 Offline
S
L
P
L
P
Points 113 [Total 5569] Ratings 2 Comments 93 Invitations 0 Offline
S
Points 89 [Total 89] Ratings 0 Comments 89 Invitations 0 Offline
S
L
R
Points 88 [Total 2185] Ratings 2 Comments 58 Invitations 1 Offline
S
L
P
R
Points 75 [Total 4083] Ratings 0 Comments 65 Invitations 1 Offline
S
L
Points 73 [Total 409] Ratings 0 Comments 73 Invitations 0 Offline
S
Points 56 [Total 56] Ratings 0 Comments 46 Invitations 1 Offline
S
L
R
R
Points 50 [Total 2363] Ratings 0 Comments 50 Invitations 0 Offline
S
L
Points 44 [Total 1585] Ratings 0 Comments 44 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.