A document repository is down when you attempt to access it. which isa principle is being violated?

Answers

Answer 1
Answer: When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.
Answer 2
Answer:

Answer:

this is wrong availability


Related Questions

MIDDLE SCHOOL

At what stage of the creative process would a designer determine the target audience for a project? revision
brainstorming
research
creation

Answers

Answer:

At the research stage.

Explanation:

For any successful business or project meant to be use by certain audiences. The audience has to be known before the project is started else what the essence of creating such project. So when researching, target audience must be given enough effort and attention for the project to be successful.

Creation, the designer would need to understand what they are making and for what type of person
HIGH SCHOOL

Which of the following translates packets so that the node can understand them once they enter through a port? A)The node translates on its own.
B)Atranslator packet
C)A NAS
D)A NIC

Answers

Hi
D)A NICHappy to assist you!
HIGH SCHOOL

An array (select more than one - all or nothing) a. is a primitive type.
b. can only store objects.
c. requires an index or indeces.
d. is considered a reference type.
e. is an object.
f. has its own instance variable called length that stores the array's length (size).

Answers

Answer:

The answers are letters C, D, E, F.

Explanation:

An array :

c. requires an index or indeces.

d. is considered a reference type.

e. is an object.

f. has its own instance variable called length that stores the array's length (size).

HIGH SCHOOL

An automated search feature used by search engines to find results that match your search terms is called a spider or

Answers

An automated search feature used by search engines to find results that match your search terms is called a spider or crawler. The correct option is C.

What is a search engine?

A search engine is a software system that performs web searches. They conduct systematic searches of the World Wide Web for specific information specified in a textual web search query.

A search crawler and a web spider do the same thing. A search engine is known by many different names, including automatic indexers and web spiders.

A crawler is a program that crawls the World Wide Web in order to provide updated data to a specific search engine. Its purpose is to generate index entries for search engines.

A crawler operates by receiving a list of URLs to visit and save. It obtains copies, which it stores for later indexing by the search engine.

Thus, the correct option is C.

For more details regarding search engine, visit:

brainly.com/question/11132516

#SPJ2

Your question seems incomplete, the missing options are:

A. bot

B. bug

C. crawler

D. creeper

An automated search feature used by search engines to find results that match your search terms is called a spider or crawler.
HIGH SCHOOL

Warren is a systems administrator working in a corporate data center, and he has been tasked with hiding storage resources from a server that does not need access to the storage device hosting the storage resources. What can Warren configure on the storage controller to accomplish this task?

Answers

Answer:

LUN masking.

Explanation:

Servers in networks are very important, since they hold the data needed by the clients in the network. A data center is a network of server that provides cloud computing services.

The servers have different categories of storage, they read and write data like DAS, NAS and SAN. This storages are hidden or authorization policies are configured to provide security and majorly to prevent storage corruption by other servers.

The logical unit numbers masking is used to determine the number of users that can access the storage, therefore, it is hidden from other unauthorised users.

HIGH SCHOOL

In paragraph form, explain and describe at least three common situations in which you would yield the right-of-way.

Answers

No, ever demand on having the right of access. It is important to note that the legislation doesn't provide anybody the right of way.

Traffic safety

It merely specifies who is required to yield. When a motorist is legally obligated to give the right-of-way nevertheless declines to do it anyway, subsequent cars must stop and otherwise yield as needed for security.

Consequently, if some other motorist fails to yield to you when he or she is supposed to, disregard it. Allow the other motorist to take the lead. Visitors will assist to reduce injuries as well as make driving greater enjoyable.

Thus the above answer is correct.

Find out more information about Traffic safety here:

brainly.com/question/9380087

Never insist on taking the right-of-way. Note that the law does not allow anyone the right-of-way. It only states who must yield. When a driver is legally required to yield the right-of-way but fails to do so, other drivers are required to stop or yield as necessary for safety. So, if another driver does not yield to you when he or she should, forget it. Let the other driver go first. You will help prevent accidents and make driving more pleasant.

COLLEGE

In a well-designed detail report, a field called a(n) ____ field controls the output. Answer
break
indexed
dominant
control

Answers

Answer:

Control

Explanation:

MIDDLE SCHOOL

What action makes RAM on your computer disappear?

Answers

Solution:

Due to the following ways it happen

1)Many startup program

2) Hard drive is failing

3) Hard drive is 95% full

4)Browser has to man ads-ons.

5)Running of to many programs

6)To many browser tabs are open

7)Rogue programs are hogging all the process

8)Having virus.  Etc

Use Windows Task Manager & Resource Monitor. The easiest way to free up RAM in use is to open Windows Task Manager. Navigate to the Processes tab and then sort the list of open programs by memory. This will reveal any process that's consuming an unusually large volume of RAM.

MIDDLE SCHOOL

Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watching his friend type in the ATM pin. What should lances friend do? the person watching lances friend typing the atm pin is an example of ( copyright infringement , hacking , shoulder browsing , software piracy ) . Lances friend should ( stop using the atm card , change the atm pin , stop using the atm machine )

Answers

Answer:

The person watching Lances friend typing the atm pin is an example of shoulder browsing. Lances friend should change the atm pin.

Explanation:

Shoulder browsing is a technique that consists in looking over people's shoulder to get information like PINs and passwords. Because of this, this is what the person watching Lance's friend is doing.

Also, what Lance's friend should do is to change the pin because as the person already stole it, he can use it to withdraw the funds in his account. So, he has to change it to avoid that.

Answer:

The person watching Lances friend typing the ATM pin is an example of "shoulder browsing" and Lances friend should "Change the ATM pin."

I hope this is the answer you were looking for!

Random Questions