1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
4 years ago
10

ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter

measures to protect the organization's information assets integrity. To accomplish the task, you need to implement multiple-layered security using the defense in depth strategy. Which three components does this strategy use?
Computers and Technology
1 answer:
kolezko [41]4 years ago
8 0

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

You might be interested in
A legend in Excel is __________.
KIM [24]

Answer:

an information key that explains how information in a chart is represented by colors or patterns

Explanation:

This is the information that is used to explain the data in the graph.

4 0
4 years ago
Read 2 more answers
Which wireless communication is typically limited to six feet of distance?
Tcecarenko [31]

Answer:

Bluetooth is a wireless communication    is  typically limited to   six feet distances

Explanation:

Bluetooth is one type of communication maximum it covers  10 meters to 30 meters.   but it is one to one communication made for data transactions.  After  25 meters of coverage on communication will be very slow on data transactions. But Bluetooth has also had a limitation.

IR.  It is one of communication where infrared technology used. It is like face to face communication and speed of data transaction limited and it is also one to one communication made for data transactions. Communication paired and covered very little distances.

NFC it is chip-based and covers very little in fact just to device meet each and communication started. And very it caries very little data during the data transactions. it is also one to one communication made for data transactions

RFID is one of communication and it is powerful to cover more areas with multiple connections at the same time. It has a limitation  in distance and it covers  like a net with a specific distance  

4 0
3 years ago
My computer screen keeps flashing black, it's on a very low brightness level and I very rarely put it up to high level unless I
mihalych1998 [28]
If your computer is old it may be the screen is dying or if its brand new it would probably  be the power supply check your battery or cables
6 0
4 years ago
Read 2 more answers
You are the senior nurse on the unit and you are orienting a new graduate LVN/LPN. One of the subjects you want to cover today i
dem82 [27]

Answer:

The correct answer to the following question will be Option D (Homans sign).

Explanation:

To medicine, the symptom of Homans is considered a sign of thrombosis by some physicians. John Homans described Homans as an annoyance under the knee of the foot to 1941 after forced dorsification.

  • Inspect the limbs for edema, pulse equality, and capillary refill.
  • Check to sign Homans.
  • Feel any warmth or redness along the Calf area.
  • Bilateral calves should be equal in size and warmth.
  • There must be no swollen, sore places, and when the woman is moving, there will be no pain in the calves.

Therefore, Option D is the right answer.

4 0
4 years ago
In Python please.
Lubov Fominskaja [6]

Answer:

Explanation:

We have the following

t is the number of test cases.

n is the number of trips for each testcase

name is the name of the city

all the unique names are added to the list and at last the length of the list is printed.

The program is written as follows

t = int(input) - for i in range(t): n = int(input) 1 = [] for j in range(n): name = input if name not in l: 1.append(name) pr

t = int(input())

for i in range(t):

n = int(input())

l = []

for j in range(n):

name = input()

if name not in l:

l.append(name)

 

print(len(l))

Output:

8 0
4 years ago
Other questions:
  • Which agricultural CTSO has programs for middle-school and high-school students, as well as college students?
    13·2 answers
  • What office application has animations on the home ribbon?
    7·2 answers
  • Create a single line comment that says ""Print results to screen""
    13·1 answer
  • How to write an shortened if statement?
    6·1 answer
  • This one too its from computer engineering
    6·1 answer
  • What are the most significant differences among structured, object-oriented, and agile methods? what do have in common?
    10·2 answers
  • What is the difference between packet filtering and a proxy server?
    11·1 answer
  • In what year did the manager and team depicted in the blockbuster film "Moneyball
    9·1 answer
  • Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
    7·1 answer
  • Why do we use the internet so much?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!