1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
2 years ago
13

If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.

Computers and Technology
1 answer:
podryga [215]2 years ago
8 0

If there is a secure socket layer in place, a password is one that you need in addition to a user id in order to access the shared files.

<h3>What is a password?</h3>

A Password is known to be a kind of a word, a phrase, or  combination of characters that is made to differentiate an authorized user or process from any kind of unauthorized user,

Hence, If there is a secure socket layer in place, a password is one that you need in addition to a user id in order to access the shared files.

Learn more about secure socket  from

brainly.com/question/13041590

#SPJ1

You might be interested in
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
What natural resources products are discussed in the article? Are they renewable or nonrenewable?
Alex

Where is the article

4 0
3 years ago
Read 2 more answers
What can save a computer from damage by sudden increases in voltage?
Simora [160]
Surge protector :) hope this helps
7 0
3 years ago
Tablets, smartphones, and video game consoles usually have which of the following types of operating systems? distributed multiu
vovikov84 [41]
Embedded.
<span>
Real-time is for thing like your thermostat (Nest) etc.
Distributed is for huge number crunching supercomputers.
Multi-user would mean more than one person was using the device at the same time with a different device.</span>
6 0
4 years ago
Read 2 more answers
Лемма деген не<br> конспект
xxMikexx [17]

huh? ano daw? kfjfdkvdddddddddddddddd

4 0
3 years ago
Other questions:
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • What appears in the document after you have inserted a video?
    14·2 answers
  • Write a program in java that reads each line in a file, reverses its characters, and writes the resulting line to another file
    15·1 answer
  • Which type of error is a random error
    13·2 answers
  • The first step to changing lanes is
    8·2 answers
  • We have a 16 GB main memory and 256 MB fully-associative cache, with block size of 64 bytes. We wish to store a 6 x 6 matrix in
    5·1 answer
  • What does the minimum password age setting control?
    15·1 answer
  • What happens when the programmer tries to access an array cell whose index is greater than or equal to its logical size?
    7·1 answer
  • What is said to be the first mechanical calculator​
    7·2 answers
  • What are the six primary roles that information system play in organizations? How are information system used in each context
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!