1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
5

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more

web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
(A) integrity
(B) scalability
(C) availability
(D) confidentiality
Computers and Technology
2 answers:
Varvara68 [4.7K]3 years ago
5 0
The answer is C) Availability.

Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.

Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.

C) Availability is the best answer because it is part of the CIA triad.

Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Gnoma [55]3 years ago
3 0

Explanation:

The three goals of information security are:

- integrity

- availability

- confidentiality

Since adding additional servers help relieve overloading by load balancing and redundancy, it will address availability AND integrity.

However, the major issue at hand is solving the overwhelming visits to the server, the plan address the aspect of availability.

You might be interested in
A(n) ________ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results pro
Tcecarenko [31]

Answer:

A _comparison_ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results produced by the query

5 0
3 years ago
Read 2 more answers
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
1 year ago
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
-BARSIC- [3]

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

6 0
3 years ago
Given two variables matric_age and grad_age, write a statement that makes the associated value of grad_age 4 more than that of m
bearhunter [10]

Answer:

grad_age=matric_age+4

Explanation:

As mention in the question their are two variable matric_age and grad_age respectively .The grad_age variable store the value of 4 more than that of matric_age i.e (matric_age+4) means that it store the value 4 plus matric_age Suppose a matric_age is initialized with 4 then value of grad_age=4+4=8.

8 0
3 years ago
Other questions:
  • The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
    15·1 answer
  • The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
    13·1 answer
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • What is the suffix of hollow?
    7·1 answer
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • In your own words, what is Cryptocurrency?
    15·2 answers
  • True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow st
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!