1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
5

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and

:
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
7 0

Complete Question:

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Group of answer choices

A. Describes how the vulnerabilities could impact the organization.

B. Provides recommendations for system configuration changes.

C. Lists them in alphabetical order.

D. Provides recommendations for additional personnel needed.

Answer:

B. Provides recommendations for system configuration changes.

Explanation:

The Microsoft Baseline Security Analyzer (MBSA) is a software program or application developed by Microsoft and it helps network security administrators to check for security updates, Structured Query Language (SQL) administrative vulnerabilities, Windows administrative vulnerabilities, Internet Information Services (IIS) administrative vulnerabilities, weak passwords, identifying missing security patches and common security misconfigurations.  

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and provides recommendations for system configuration changes.

<em>Microsoft Baseline Security Analyzer (MBSA) is a legacy software that scores the results of a scan and displays the items posing the highest risk first, based on Microsoft’s security recommendations</em>.

You might be interested in
What is unique address in ICT​
iren2701 [21]

Answer:

IP Addressing.

Explanation:

It stands for Internet Protocol address. It is a unique address that identifies a computer on a network such as the Internet.

Hope this helped you!

4 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Tom [10]

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

8 0
4 years ago
Read 2 more answers
A database at a college is required to support the following requirements. Complete the information-level design for this set of
Maslowich

Answer:

Explanation:

check the attached files below for answers to your question, thanks.

6 0
3 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
mario62 [17]

Answer: (D) IPCONFIG

Explanation:

The IPCONFIG is the type of tool that can be use to flush or refresh the dynamic host configuration (DNS) cache on the window client. The IPCONFIG display various types of parameters such as subnet mask, IP address and the default gateway.

 In the computing, the IPCONFIG is stand for the internet protocol configuration and it is one of the operating system applications which basically display all Transmission control protocol/ Internet protocol (TCP/IP) network configurations.

Therefore,Option (D) is correct.

 

3 0
3 years ago
The internet is an accurate and reliable source of information and an investigator should take the information at face value. tr
AVprozaik [17]
False

Not everything is true, face value is not always reliable
7 0
3 years ago
Other questions:
  • Colleen is creating a document with two minimal paragraphs of text comparing two business models for her company. She decides to
    14·2 answers
  • What are three situations when recursion is the only option available to address problems?
    10·1 answer
  • How does form get its power natural gas
    14·1 answer
  • A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A​
    13·1 answer
  • which artists work provides visual effects to enhance the action of an animated movie , film, or video
    11·1 answer
  • In the 1800s, the Know-Nothing Party worked to accomplish which of the following?
    7·1 answer
  • Which of the following is NOT an e-reader you would use as an alternative to carrying around a set of textbooks?
    13·1 answer
  • Doing free poitns soon!
    7·2 answers
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • Give the an example of the following .<br>a.)typing software<br>​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!