FUNDAMENTALS OF COMPUTER

APPLICATION SYSTEM SOFTWARE

SYSTEMS SOFTWARE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
IF I WORKED VERY HARD, AND SPENT A LOT OF EFFORT CREATING AND DEVELOPING A SOFTWARE I WOULD PROBABLY WANT TO CONTROL WHO GETS TO USE IT. HOW COULD I DO THIS?
A
PROTECT IT WITH A PASSWORD
B
MAKE IT VERY DIFFICULT TO USE
C
PROTECT IT WITH A LICENSE
D
SURROUND IT WITH POISON IVY
Explanation: 

Detailed explanation-1: -Physical access control is utilizing physical barriers which can help prevent unauthorized users from accessing systems.

Detailed explanation-2: -Create A Virtual Private Network (VPN) With a VPN, only those authorized to access your systems will be able to do so. A VPN can dramatically decrease the likelihood of hackers finding a wireless access point and wreaking havoc on your system.

Detailed explanation-3: -Purpose of Security Management The goal of security management procedures is to provide a foundation for an organization’s cybersecurity strategy. The information and procedures developed as part of security management processes will be used for data classification, risk management, and threat detection and response.

Detailed explanation-4: -Navigate to the folder or file you want to encrypt. Right-click on the item, click Properties, then click Advanced. Check Encrypt contents to secure data. Click OK, then click Apply.

There is 1 question to complete.