1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
4 years ago
10

ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter

measures to protect the organization's information assets integrity. To accomplish the task, you need to implement multiple-layered security using the defense in depth strategy. Which three components does this strategy use?
Computers and Technology
1 answer:
kolezko [41]4 years ago
8 0

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

You might be interested in
Which of the following is a trademark automatically received by an organization when a symbol is being consistently used in the
Mashcka [7]

Complete Question:

Which of the following is a trademark automatically received by an organization when a symbol is being consistently used in the normal course of business?

Group of answer choices

A. Open source trademark.

B. Common law trademark.

C. Registered trademark.

D. Open source trademark.

Answer:

B. Common law trademark.

Explanation:

A common law trademark can be defined as a protection or enforceable mark for a product name, logo, symbol or brand name used to distinguish goods and services prior to its registration with the state or federal government. Common law trademark is a trademark which is automatically received by an organization when a symbol is being consistently used in the normal course of business.

This ultimately implies that, common law trademarks are not governed by any statute and as such are only limited to the geographical location where they are used.

For instance, if a tomato paste is being sold to consumers with the product name "Ginoo" in Florida, the company's trademark applies to Florida only. Thus, another company can use the product name without any trademark infringement in other states of the country such as New York, Washington DC, California etc. except in Florida due to a common law trademark.

4 0
3 years ago
Match the partition type to its description.
zlopas [31]

Answer:

A partition with an extended partition is a logical partition.

The partition with the boot loader is the system partition.

The section of the hard drive where you will install the operating system is the primary partition.

Read more on Brainly.com - brainly.com/question/14356373#readmore

Explanation:

7 0
3 years ago
--------------communication involves one speaker andaudience.
dalvyx [7]

Answer:

Person-to-Group

Explanation:

Person-to-Group communication involves one speaker and audience.

6 0
3 years ago
MARKING BRAINLIEST
BabaBlast [244]

Answer: Well, first of all, you might want to change websites. I suggest khan academy.

anyways if your a begnner *Like me* The you might wanna try Java Script! in other words i do not know how to work Python

8 0
3 years ago
Word processing programs, spreadsheet programs, email programs, web browsers, and game programs belong to what category of softw
liq [111]

Answer:  They belong to a category of software known as Application program

Explanation: an application program is a computer program that is designed and implemented to carry out a specific task or for a specific purpose. Spreadsheet programs for instance are designed and implemented to carry out mathematical calculations, gaming programs for recreation, web programs for connecting to the internet and email programs for sending and receiving of emails.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is TCP/IP's Transport layer's primary duty?
    8·1 answer
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • What is the value of numX when this program is executed? if 3 < 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • DUE SOON NEED HELP FAST!!
    11·1 answer
  • What is one difference between a web page and a web application?
    11·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!