1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
4 years ago
10

ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter

measures to protect the organization's information assets integrity. To accomplish the task, you need to implement multiple-layered security using the defense in depth strategy. Which three components does this strategy use?
Computers and Technology
1 answer:
kolezko [41]4 years ago
8 0

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

You might be interested in
What is the definition of a command computer?
Westkost [7]
In computing, a command<span> is a directive to a </span>computer<span> program acting as an interpreter of some kind, in order to perform a specific task. i hope this helps

</span>
6 0
3 years ago
Is doing free lancing from age 16 good or bad?​
Art [367]

Answer:

I think it's good. It will serve as an experience for you. Having experience at an early age is better as you could be at your best before you go into the field that you want. Plus free lancing wouldnt tie you down, gives you more freedom. And extra income(?). ^^

8 0
2 years ago
What can you do with youtube red that you cant do with a normal account?
ipn [44]
No, Ad's. Extra Videos Created By Youtube, and thats about it lol oh and you can play the audio in the background of your phone, like lets say your listening to some music on youtube, and you want to play a game on your phone while listening to that tune on youtube, i just said screw youtube, i jailbroke my device and i have 20X more control of my youtube setting, etc.. and plus i can do more without youtube red tbh lol.
7 0
3 years ago
Read 2 more answers
____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
cupoosta [38]

Answer:

a. Leveling          

Explanation:

  • Leveling is also called decomposing.
  • It is a method to depict more detail in lower-level Data Flow Diagrams
  • It is the technique to expand or decompose DFDs into more details or levels to extract more information and identify all functional primitives until no further detail is required.
  • An information system can be comprised of multiple processes. Leveling partitions each process into sub-processes which identifies more details about the process with each level.
  • 0-level DFD: it starts with context diagram which depicts the whole system as a single process e.g. Grading system.
  • 1-level DFD: the context diagram is decomposed in this level. This means a single process is expanded into multiple processes which extracts more details about a process of a system.
  • 2- level DFD: this level decomposes the the process of level 1 going into further details.
  • This decomposition and expansion continues until no further details are required and all functional primitives are identified.
8 0
4 years ago
Kylie lives near a beautiful beach and has grown up surfing the waves. Many families come to visit her area and Kylie has notice
ch4aika [34]
La gente de que no me han dicho que me ha dado un teléfono y me han
4 0
3 years ago
Other questions:
  • What does a contain after the following code runs?int[] a = {1, 3, 7, 0, 0, 0};int size = 3, capacity = 6, value = 5;int pos = 0
    10·1 answer
  • How much Continents Arctic Ocean that touches
    5·2 answers
  • An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
    15·1 answer
  • Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A
    15·1 answer
  • How are gems and precious metals similar?
    6·2 answers
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Which line of code in this program is MOST likely to result in an error
    15·2 answers
  • Difference between the four generations of computers in a tabular form​
    8·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
  • Joining a computer to active directory involves joining the computer to a workgroup. True or false.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!