1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
5

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and

:
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
7 0

Complete Question:

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Group of answer choices

A. Describes how the vulnerabilities could impact the organization.

B. Provides recommendations for system configuration changes.

C. Lists them in alphabetical order.

D. Provides recommendations for additional personnel needed.

Answer:

B. Provides recommendations for system configuration changes.

Explanation:

The Microsoft Baseline Security Analyzer (MBSA) is a software program or application developed by Microsoft and it helps network security administrators to check for security updates, Structured Query Language (SQL) administrative vulnerabilities, Windows administrative vulnerabilities, Internet Information Services (IIS) administrative vulnerabilities, weak passwords, identifying missing security patches and common security misconfigurations.  

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and provides recommendations for system configuration changes.

<em>Microsoft Baseline Security Analyzer (MBSA) is a legacy software that scores the results of a scan and displays the items posing the highest risk first, based on Microsoft’s security recommendations</em>.

You might be interested in
c) Do hardware purchases or salaries for IT workers demand a greater share of the total cost of the ownership of the IT infrastr
atroni [7]

Answer:Yes, with increase in the need for IT, and the constant improvements in IT, there is a need to recruit Qualified IT professionals who are knowledgeable.

With new technologies developing with a fast pace,there will be a constant need to invest in IT hardwares in order to meet with the increasing challenges.

Explanation:IT(Information technology) is a term used to describe the processes through Information is sent from one point to another through one or more media.

The field of Information technology is constantly evolving with several improvements taking place around the globe, Medium sized companies will need to constantly make expenditures on both the IT infrastructures and the IT professionals both as permanent employees or as contracted experts.

6 0
3 years ago
Read 2 more answers
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
The question is provided in the image below.
Vladimir [108]

Answer: b

Explanation:

3 0
2 years ago
Ayoooo new friends? btw imma girl
liberstina [14]
Yup, me ... i wanna be friends
4 0
3 years ago
Read 2 more answers
Which definition of intelligence is based on the Turing test?
Kitty [74]

Answer:

The Turing Test is a deceptively simple method of determining whether a machine can demonstrate human intelligence

Explanation:

8 0
3 years ago
Other questions:
  • Text filters allow you to create a custom filter to match ________ the text in a field that you specify.
    7·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • Computer-aided design software is used primarily by:
    13·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what effect needs to be applied?
    13·1 answer
  • Once sales are​ forecasted, ________ must be generated to estimate required raw materials. A. a pro forma statement B. a product
    8·1 answer
  • We cannot create a blank table true or false​
    8·1 answer
  • Give two differences between EIRGP and RIP.
    14·1 answer
  • Why is the GPS so important today?
    9·1 answer
  • Strobe lights can become more yellow as they age true or false
    8·1 answer
  • How exactly do you find the circumference by using C++ Programming? I really need a specific answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!