1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
4 years ago
15

When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish

normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
​B. Baseline
​C. Forensic log
D. Vulnerability assessment
Computers and Technology
1 answer:
8_murik_8 [283]4 years ago
3 0

Answer:

The answer is "Option B".

Explanation:

The Baseline measurement is an essential characteristic of effective coal company monitoring programs to assess the degree of mining effects and keep on improving effect monitoring the system will continue to be modified via periodical analyses, and the wrong choices can be defined as follows:

  • In choice A, it is wrong because it used in 3D printing technology.
  • In choice C, it is used to analyze the log entities, that's why it is wrong.
  • In choice D, it is used to analyze the security weaknesses, that's why it's wrong.
You might be interested in
a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​
Svetllana [295]

Answer:

do 15% on a calculator then divide by 9

Explanation:

7 0
3 years ago
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more t
daser333 [38]

Answer:

the gps and a map

Explanation:

3 0
3 years ago
Read 2 more answers
Traffic collisions are among the top killers of children in America.
Blababa [14]
Whats the question if its true or false, then true
8 0
3 years ago
Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
damaskus [11]

Answer:

There is also an attachment below

Explanation:

Since we are talking about binary search, let's assume that the items are sorted according to some criteria.

Time complexity of binary search is O(logN) in worst case, best case and average case as well. That means it can search for an item in Log N time where N is size of the input. Here problem talks about the item not getting found. So, this is a worst case scenario. Even in this case, binary search runs in O(logN) time.

N = 700000000.

So, number of comparisions can be log(N) = 29.3 = 29.

So, in the worst case it does comparisions 29 times

7 0
3 years ago
How does Botnet operate and communicate.
zhuklara [117]

Answer:

 Botnet is typically operate by the internet relay networking and domain. The botnet are generally received specific type of the instruction from the control server.

The main purpose and structure of botnet is basically depend upon the various type of instruction and structure.

The botnet is communicated with the help of IRC ( Internet relay chat) and it is basically communicated with the chat server for transferring the data to the client. The IRC network basically use simple network with low bandwidth for communication with the host of the botnet.

4 0
3 years ago
Other questions:
  • If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
    9·2 answers
  • What happened to Henry at the end of Chapter 4 in Bendy and the ink machine?
    9·2 answers
  • How can development in ICT be utilized to speed up the development and integration efforts
    5·1 answer
  • The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.a) bzip2
    11·1 answer
  • What is the ascii code for the letter D
    8·1 answer
  • What type of computer system can be found in the computer lab at school?
    14·1 answer
  • Will give brainliest!<br> Who created binary, and does anyone have any idea how?
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
  • software that opens files and scans their code to look for certain types of malware is known as software.
    7·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!