1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
1 year ago
7

you manage information systems for a large co-location data center.networked environmental controls are used to manage the tempe

rature within the data center. these controls use embedded smart technology that allows them to be managed over an internet connection using a mobile device app.you are concerned about the security of these devices. what can you do to increase their security posture? (select two.)
Computers and Technology
1 answer:
Gre4nikov [31]1 year ago
4 0

To ensure the security of the system, you need to verify that the existing network infrastructure is working properly and devices being used in the system must have the latest firmware updates from the manufacturer.

If you are working as a manager at a large co-location data center to manage the information system. The information system's environmental temperature is controlled by smart technology and is managed over an internet connection via a mobile app.

To increase the security of the system:

  • You need to verify that the existing networking infrastructure is working properly and managed accordingly from a security perspective.
  • Also, you need to install the latest firmware updates from the device manufacturer to ensure the proper security of the system.

You can learn more about information system security at

brainly.com/question/14471213

#SPJ4

You might be interested in
Suppose that bClass is a class. Which of the following statements correctly derives the class dClass from bClass? a. class dClas
DerKrebs [107]

Answer:

The answer to the given question is option "d".

Explanation:

In C++ programming language we use the (:) colon to perform inheritance in the class. The by default access modifier is used for inheritance that is "private". In the given options the option d is correct and other options are not correct that cab be described as:

  • In option, a, b we use the scope resolution operator (::) that is not used for inheritance.
  • In option, c we inherit drive class to base class that is not correct.  

That's why the answer to this question is option "d".

4 0
4 years ago
An authenticated user can add up to how many computer accounts to the domain, by default
Brums [2.3K]
By default, 10 computers can be joined to the domain by both users and administrators. As long as a user is authenticated against the Active Directory, he or she can add up to 10 computers to the domain.
While this one posses as an advantage for smaller companies, it is not a desirable feature for bigger companies since they have to control more tightly who can add machines to their domain.
7 0
4 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
4 years ago
Read 2 more answers
It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
stepan [7]

Answer:

right -click

Explanation:

<h2><u>Fill in the blanks </u></h2>

It is important to <u>right - click</u>  the line in the code editing window in the exact location where you want to insert a code snippet to produce the shortcut menu with the Insert Snippet command.

8 0
3 years ago
What are the cons of using keyboard shortcuts?
Yanka [14]

Answer:

Mistakes can easily occur while using them.

4 0
3 years ago
Other questions:
  • Which kind of journal gives submissions to outside scientists to read and comment upon?
    9·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar
    9·2 answers
  • The number of semi skilled workers in an industry find themselves out of work, when improvements in technology render their jobs
    15·1 answer
  • Could you please check my answers to this layout user defined data types
    15·1 answer
  • What is a non-example of job skill
    13·1 answer
  • What is the deference between touch screen phone and keypad phone
    6·1 answer
  • If you said the bottom margin, you are talking about what?
    13·2 answers
  • Digital computers use a........ system to encode date and programs.<br>​
    8·1 answer
  • How to delete account
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!