1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
2 years ago
7

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco

ls a security issue that you should be concerned about?
Computers and Technology
1 answer:
wlad13 [49]2 years ago
3 0

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

You might be interested in
Why do i get message notifications but when i click on it it says i have no new messages?
jeka57 [31]

Answer:

Might just be a glitch you should try to ignore it for the time being or you can log out then log in to your acc

Explanation:

good luck

4 0
3 years ago
What command in cisco IOS allows the user to see the routing table
maksim [4K]

Answer:

Show IP route command

Explanation:

7 0
3 years ago
Questions
allsm [11]

Answer:

intrusion detection

Explanation:

The internet content filter is not going to check whether you are not welcome to any site, and that is done by intrusion detection, and hence, this is not performed by the internet content filter. However, content inspection, malware inspection, and URL filtering are performed by the internet content filter.

4 0
3 years ago
Why should you not perform any personal grooming task while driving?
VLD [36.1K]

Answer:

Drivers most capable of multitasking effectively are not those who are most likely to engage in multiple tasks simultaneously. Instead, people who score high on a test of actual multitasking ability tend not to multitask because they are better able to focus attention on the task at hand.

Explanation:

8 0
4 years ago
Read 2 more answers
Microsoft Windows is the least used operating system. TRUE or FALSE.
Katen [24]
<span>This is false. In the context of the US, Microsoft Windows is the operating system used the most. In fact, 1.5 billion people worldwide use Microsoft Windows. </span>
4 0
3 years ago
Other questions:
  • You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
    7·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • Why is time management considered a soft skill
    10·2 answers
  • LAB: Formatted output: Hello World! Write a program that outputs "Hello World!" For ALL labs, end with newline (unless otherwise
    10·1 answer
  • The use of computers in education is referred to as computer-assisted instruction (CAI). Write a program that will help an eleme
    9·1 answer
  • Consider a two-link network where Host A is connected to the router by a 1 Mbps link with 10 ms propagation delay and the router
    6·1 answer
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able t
    13·2 answers
  • Will Give Brainiest to the first correct answer!!!!
    10·2 answers
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!