1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
12

___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect

ion mechanism in the environment will fail at some point.
Computers and Technology
1 answer:
natta225 [31]3 years ago
3 0

Answer:

Layered security

Explanation:

Layered security is a multiple layers defense practice used to protect resources and data. One goal of the layered security is to create redundancies or also known as backups to face the situation that one or more of the security measures in the outer layer fail or are bypassed, at least the resources and data still get protected by inner layer security. The number of security layer set for the resources is dependent on how important the resources are.

You might be interested in
What is an advantage of unicode over ascii?
tamaranim1 [39]
Unicode is a 16 bit system which can support 65636 different characters which is much more than the number of characters that ASCII code support.
7 0
3 years ago
You are traveling throughout North America to many metropolitan and rural areas. Which single form of internet connectivity prov
Rudiy27

Answer:

PSTN

Explanation:

The full form of PSTN is Public Switched Telephone Network. It is a traditional circuit-switched telephone network which is used by the several regional, local or national telephony operators. They came in used in 1800s. It is a form of communication among the people which works with the help of underground copper wires.

In the context, when I am travelling through the metropolitan as well as the rural areas of the North America, the PSTN provides the internet connectivity in all the places. It helps me to communicate with the other people with the help of a telephone.

7 0
3 years ago
Lenovo laptop
igor_vitrenko [27]
Oh i do i do i do .... but could u retake the pic. it is kinda blurry
4 0
3 years ago
Draw a flowchart to accept two numbers, and then output the result as the first number
spin [16.1K]

Answer:

See attachment for flowchart

Explanation:

- The flowchart starts and ends with an oval shape.

- The flowchart accepts input for variables First and Second using the parallelogram shape.

- After both inputs have been collected;

The flowchart calculates First^Second and stores the result in variable Result.

-The value of Result is printed, afterwards.

8 0
3 years ago
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Other questions:
  • La inteligencia o unidad lógica de un computador se denomina como??? Software, Hardware CPU o que, ayuda.....
    7·1 answer
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • The IT Department already has been testing Windows Server 2012 R2, and some time ago purchased licenses to convert all of its Wi
    14·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • Time
    6·1 answer
  • Write a program that performs a simulation to estimate the probability of rolling five of a kind in a single toss of five six-si
    9·1 answer
  • For a business that is properly using a social media information system, the system can
    13·1 answer
  • WILL MARK BRAINLIEST FOR ANYONES ANSWER!
    12·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!