1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
2 years ago
7

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco

ls a security issue that you should be concerned about?
Computers and Technology
1 answer:
wlad13 [49]2 years ago
3 0

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

You might be interested in
Which of the following offers a combination of the features of ram and rom?
IRISSAK [1]

Cache Flash memory offers a combination of the features of ram and rom.

Memory made of cache flash combines ROM and RAM functionalities. It can be upgraded to store fresh information, just like RAM. It retains the data even if the power to the computer system is turned off, unlike ROM.

Non-volatile computer memory that may be electrically erased and reprogrammed is called flash memory.

• This technology is mainly utilized in memory cards and USB flash drives (also known as thumb drives, handy drives, memory sticks, flash drives, jump drives, and "Cap N' Go") for broad data storage and transmission between computers and other digital devices.

• It is a particular kind of EEPROM (Electrically Erasable Programmable Read-Only Memory) that can be programmed and wiped in big chunks.

• PDAs (personal digital assistants), laptop computers, digital music players, digital cameras, and mobile phones are a few examples of applications.

• It has also become more common in the market for video game consoles, where it is frequently utilized for game save data instead of EEPROMs or battery-powered SRAM.

Know more about flash memory here:

brainly.com/question/13014386

#SPJ4

5 0
1 year ago
Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
Llana [10]
The answer is (C) Rating scale test

These are set of categories designed to get a response from set information about a qualitative or a quantitative attribute. Common examples include a 1-10 rating scale or the Likert response scale. One is required to select a number or an option considered to reflect the perceived quality of something, say a product.






4 0
3 years ago
How does Wireshark differ from NetWitness Investigator?
nikdorinn [45]

Answer is given below

Explanation:

  • Wireshark differ from NetWitness Investigator because
  • Windshark shows a detailed view of individual packets.
  • WireShark captures live traffic and displays the results at the packet level.
  • Netwitness shows a high-level view and can be compared to the new packet capture
  • NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.
8 0
3 years ago
write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and bo
Trava [24]

Answer:

Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.



Ray during recording of his film Pather Panchali

Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.

3 0
3 years ago
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
Other questions:
  • describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c
    9·2 answers
  • . A technology professional keeping up-to-date on current developments may find it valuable to
    13·1 answer
  • Replace the underlines with the words in parentheses that follow: the ____ solves the ____ of a ____ by expressing an ____ in a
    8·1 answer
  • Which of the following best describes the Distribution Mix?
    15·1 answer
  • ​the complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
    7·1 answer
  • Discuss trends in cellular data transmission speeds
    15·2 answers
  • What is the complete predicate in the sentence below? Looking up from his computer monitor, Jason mopped his brow, exhaled sharp
    12·1 answer
  • Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.
    12·1 answer
  • Which power backup method will continually provide power to a server if the power goes out during a thunderstorm
    11·1 answer
  • HELP QUICK!!!!!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!