1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
15

In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci

se strategy possible, starting with ____.
a. blocking a port

b. blocking incoming connections

c. blocking a specific ip address

d. blocking a class of service
Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
8 0
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

You might be interested in
Gaming related
Blababa [14]

Answer:

yes affects your K/D

Explanation:

winner winner chicken dinner

please mark me please brainliest or mark thanks

5 0
2 years ago
If you code a column list in an INSERT statement that includes a column that’s defined with a default value, you can insert the
Vinvika [58]

Answer:

If you code a column list in an INSERT statement that includes a column that’s defined with a default value, you can insert the default value for that column by coding the DEFAULT keyword in the VALUES clause of the INSERT statement.

Explanation:

SQL permits insert the DEFAULT value on the columns when is required. Suppose the column has a NULL constraint(values on this column can not be set in null), then you can pass the default value.

For example:

INSERT INTO table(field1, field2, field3, field4) VALUES (10, DEFAULT, 20, DEFAULT)

6 0
3 years ago
Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
Aleks04 [339]
<span>editing the image file in a dedicated photo editing program before inserting it</span>
8 0
3 years ago
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
What does CIA stands for​
photoshop1234 [79]

Central Intelligence Agency

6 0
2 years ago
Read 2 more answers
Other questions:
  • Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
    6·1 answer
  • Provide the definition for each of the following structures and unions:
    8·1 answer
  • Which do web servers host?<br> Websites<br> Networks<br> Firewalls<br> Zones
    8·1 answer
  • Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a
    5·1 answer
  • Non-preemptive Shortest Job First (SJF) scheduling policy is not optimal if:
    7·1 answer
  • An index purports to speed data retrieval. you, therefore, index every attribute in each table. select the likely consequence.
    15·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • Answered
    10·1 answer
  • Select the correct answer. Who takes care of the final layout of the product that meets the standards set by UX designers? A. we
    15·1 answer
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!