1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
5

An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed cryptocurrency mining software on the organization’s web servers. Given the organization’s stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
4 0

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

You might be interested in
Consider a hard disk with the following specifications :<br> 3.5 in diameter
AnnyKZ [126]

Answer:

usable capacity = 10 GB

Number of cylinders = 256

Block size = 4 KB

(1)Bytes in each cylinder = (10*230)/(256) = (10*222) = 40 MegaBytes

(2)Number of Blocks in each cylinder = (10*222)/(212) = 10K

(3)capacity of one track = 40 MegaBytes/(10*2) = 2 MB

Rotation speed = 3840 RPM

Number of rotations per second = 3840/60 = 64

Transfer rate = (2*64) = 128 MB/sec

Explanation:

6 0
3 years ago
How bout these chose your fave for bnha
VARVARA [1.3K]
The third one is mine
6 0
3 years ago
Read 2 more answers
Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
Blababa [14]

<u>Explanation:</u>

The program using <em>python programming language </em>would be:

First, we write the Input prompt.

<u>Input  prompt for the user</u>

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

<u>Process  algorithm</u>

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

<u>Output process</u>

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

7 0
3 years ago
How does it transform your ways of socializing
frez [133]

How to transform your ways of socializing:

Know Yourself. The first and foremost reason why many people fail in effective socializing is the fact that they don’t know themselves well.

Be yourself. Another reason of failing to socialize or failing to make that “first impression” is that we try to mimic others.

Body Language. The way you walk, stand, talk, eat and sit… Each and every gesture and posture of yours speaks volumes about you.

Your attire. I had a client who had severe social anxiety. It was aggravated when her mother forced her to wear stuff that was too body revealing.

etc.

This was written from a biography about someones experience.

_____________________________

<em>Brainliest </em>would be greatly appreciated.

I found this!

______________________________

<em><u>#SpreadTheLove</u></em>

<em><u>#SaveTheTrees</u></em>

4 0
3 years ago
Write the advantage of magnetic storage over sequential storage device.​Write in points.​
Nikolay [14]

Answer:

External storage devices

  • External HDDs and SSDs. ...
  • Flash memory devices. ...
  • Optical Storage Devices. ...
  • Floppy Disks. ...
  • Primary Storage: Random Access Memory (RAM) ...
  • Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...
  • Hard Disk Drives (HDD) ...
  • Solid-State Drives (SSD)

5 0
3 years ago
Other questions:
  • DHCP and FTP servers listen for and send network traffic on:
    5·1 answer
  • The function takes two string parameters; the first is the name of a file and the second is text. Complete the function to appen
    7·1 answer
  • A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
    11·1 answer
  • Consider an environment in which there is a one-to-one mapping between user-level threads and kernel-level threads that allows o
    7·1 answer
  • A computer has been stored, uncovered, in a dusty closet for several months. Why might this situation cause the operating system
    13·1 answer
  • What are copyright laws? Authority to reprint an original work as long as it's not for profit Entitlement to use and sell anothe
    15·2 answers
  • A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
    8·1 answer
  • Suppression of politically or socially unacceptable co
    5·1 answer
  • What do conditions do for programs?
    15·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!