1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
9

Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo

rk resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?
Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

Answer:

LDAP(Lightweight Directory Access Protocol) is the correct answer.

Explanation:

Because when the hackers attack on the computer network resources and also theft and make unavailable some computer resources after that, they have done this by exploiting the individual protocols. So, that's why LDAP protocol should be needed to secure from the following attacks and Lightweight Directory Access Protocol is used for both client and the server-side protocol.

You might be interested in
In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d.
defon
D) combine
combine and merge are synonyms of each other.
hope this helps x
6 0
3 years ago
____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
nikdorinn [45]

Answer:

c. NSTISSI No. 4011

Explanation:

NSTISSI is an acronym for National Security Telecommunications and Information Systems Security Institute.

It is one of the standards set by the Committee on National Security Systems (CNSS), an intergovernmental agency saddled with the responsibility of setting policies for the security of the IT (information technology) security systems of the United States of America.

NSTISSI No. 4011 presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.

Generally, all information technology institutions and telecommunications providers are required by law to obtain a NSTISSI-4011 certification or license because it is a standard for Information Systems Security (INFOSEC) professionals.

8 0
3 years ago
What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
vitfil [10]

Answer:

A. 3mn

Explanation:

48 divides by 2 48 = 24 x 2

then =2 x 2 x 12

then = 2 x 2 x 2 x 2 x 3

greatest factorization is 3 therefore,

3mn is the answer

8 0
3 years ago
Which two statements describe the Functions of a modem
cupoosta [38]

Answer:

A modem is the internal or external device its function is to transfer data over communication lines

modems use two different types of data transmission

synchronous and asynchronous

The functions of modem have changed over years it was first used for telegrams and to transmit data in 1950s.

Modems were used with computers in  1977 for first time to transmit data between computers  firstly it was used for small amount of computers

As modem improves day by day and were able to transmit information fastly between two or more hosts and the internet network slowly spreads

There are four types of modems ,

1 Fax Modems which solely transfer data between fax machines

2 The traditional ISDN modem

3 the Digital Subscribers Line

4 the Cable Modem

Explanation:

3 0
3 years ago
What motivates high school students to join professional organizations?
Jet001 [13]
Having a good curriculum, learning more about something that you like, helping people. It also depends on what professial organization students wanna join. 
8 0
3 years ago
Read 2 more answers
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • ___________ is the ability of a product to satisfy a customer.
    11·1 answer
  • A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are e
    14·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • A method that movie distributors are adopting to make it possible to view movies instantly, without DVD, is known as:
    11·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • What is combo chart ? how will you created a combo chart​
    11·2 answers
  • Which formatting options can be changed by selecting the Design tab? Check all that apply.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!