1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
7

A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to access the company

’s network securely without allowing to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO?
a. VPN
b. Paas
c. Iaas
d. VDI
Computers and Technology
1 answer:
MakcuM [25]3 years ago
5 0

Answer:d) VDI(Virtual desktop infrastructure)

Explanation: VDI(Virtual desktop infrastructure) is the infrastructure of the managing technology the virtual desktops.The central host is the devices that helps in the management of the  these virtual devices/desktop. Hypervisor is required for virtualization of the server .It also provides security by providing data at the data center/hub.

Other options are incorrect because VPN(Virtual private network)small network connection in network environment with less security, Paas (platform as a service) is a cloud computing technology for users to develop application and Laas(Location as a service)  helps in delivering the location.Thus , the correct option is option (d).

You might be interested in
Good information is characterized by certain properties. Explain how you understand these characteristtics of good information.
Sedbober [7]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
2 years ago
A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
Aneli [31]

Answer:

A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utilities.

Explanation:

7 0
3 years ago
What was the first Apple computer, and who was it designed by?
DerKrebs [107]

Answer: The first Apple Computer was Apple 1. The designer was Steve Wozniak.

Explanation: Steve Wozniak and Steve Jobs both created Apple 1. Mainly, Steve Wozniak designed it.

Hope this helps!

7 0
3 years ago
Read 2 more answers
What kind of advertising is used in Saunders's story when a man and his grandson walk down the street? O A. An individualized au
omeli [17]

Answer: An individualized audio device.

Explanation:

Advertising simply refers to an attempt which is made by an individual or company in order to influence the buying behavior of the customer by convincing them to buy a product.

The kind of advertising that is used in Saunders's story when a man and his grandson walk down the street is an individualized audio device. Therefore, the correct option is A.

8 0
3 years ago
How many channels can the 2.4 GHz band be divided into?
wlad13 [49]

Answer:Fourteen channels

Explanation:

8 0
3 years ago
Other questions:
  • Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
    8·1 answer
  • Joshua wants to be a lawyer. He found the following table on the Bureau of Labor Statistics’ website to find out about the emplo
    13·2 answers
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • In a chassis, the path along which air from a cool air source is conducted, past equipment to cool it, and then out of the rack.
    13·1 answer
  • Software that function as an electronic file cabinet
    7·1 answer
  • Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
    13·1 answer
  • A part-time job performed while in high school must have the approval of your school counselor.
    7·2 answers
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • 3. Create mode was one of the most innovative and influential features of which of the following games?
    7·1 answer
  • Which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!