1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
15

In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci

se strategy possible, starting with ____.
a. blocking a port

b. blocking incoming connections

c. blocking a specific ip address

d. blocking a class of service
Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
8 0
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

You might be interested in
What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while
Yakvenalex [24]

Answer:

You can share the presentation with your group. Share the presentation with everyone by email so everyone can work on it at once. Give your group members their own part to work on.

Explanation:

4 0
4 years ago
What is a zener diode
V125BC [204]

a form of semiconductor diode in which at a critical reverse voltage a large reverse current can flow.
8 0
3 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Plato I need answers asap will
Alja [10]

Answer:

Thanks for the points  

Explanation:

3 0
3 years ago
Discuss any five barries of integrating ict tools in education​
yawa3891 [41]

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

3 0
3 years ago
Other questions:
  • The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses. ____
    5·1 answer
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • HURRY! The steps for printing mailing labels are available after you click which icon?
    15·1 answer
  • Which of the following is an example of a wanted versus I need
    5·1 answer
  • You arrive to an intersection with traffic
    12·1 answer
  • Expresa tu reflexión sobre la necesidad de un código de etica para la IA (inteligencia artificial) , oponia sobre los bots en la
    15·1 answer
  • 1) Input - to be done in main() Prompt the user for and input the number of units. Prompt the user for and input the amount for
    12·1 answer
  • В.
    11·1 answer
  • Can I control my digital footprint?
    9·2 answers
  • What is the difference between packaged and tailored software ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!