1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
4 years ago
10

Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers

the amount and impact of unintentional errors that are entering the system?
Computers and Technology
1 answer:
Degger [83]4 years ago
5 0

Answer:

The correct answer is Preventative controls.

Explanation:

Preventive Controls: Anticipate unwanted events before they happen.

  • They are more profitable
  • They must be incorporated into the systems
  • Avoid correction or reprocessing costs

Example: Security software that prevents access to unauthorized personnel, to try to prevent the production of errors or fraudulent events.

You might be interested in
you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish t
ollegr [7]

A command you would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system: dig -x 10.0.0.3.

<h3>What is a Linux command?</h3>

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

<h3>What is IP address?</h3>

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, a command which an administrator (end user) would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system is dig -x 10.0.0.3.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

3 0
2 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Which type of malware self-replicates between computers (from one computer to another)?
kramer
A "worm" is a self-replicating malware.
6 0
4 years ago
In the admin console, which three of these gmail settings can an administrator set for the entire domain? (choose 3)
ehidna [41]
<span>In the admin console, three settings than an admin can set for the entire domain in gmail are to enable users to set their own themes in gmail, allow users to delegate their mail out to other users, and enable users to have the ability to import their email from other platforms like yahoo, web mail, or hot mail.</span>
5 0
4 years ago
Which two devices are paired to create a memory cell? what term is used to describe this common form of computer memory? (2 poin
elena-14-01-66 [18.8K]

A transistor and A capacitor

<h3>What are transistors and capacitors?</h3>
  • Transistors are semiconductor devices used to amplify or switch electronic signals.
  • Inductors are passive electrical devices in electrical circuits for their property of inductance.
  • While a capacitor opposes changes in voltage, an inductor opposes changes in current.

To learn more about it, refer

to https://brainly.in/question/413163

#SPJ4

6 0
2 years ago
Other questions:
  • Unlike a virtual image, a real image
    7·1 answer
  • Write a program that reads from user (i) an hour between 1 to 12 and (ii) number of hours ahead. The program should print the ti
    15·1 answer
  • What stage of software development incorporates planning to help make changes in the project plan based of reviews
    12·1 answer
  • What is a pin? part of a connector a port part of a cable a NIC
    14·1 answer
  • What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
    14·1 answer
  • The problem with the media giving equal air time to those who are __________ about the effects of media violence on violent beha
    9·1 answer
  • ____ technology is the same as that used in digital watches, or the time display on a microwave oven
    14·1 answer
  • Write a Python program that asks the user for a positive, odd value. Once the value is validated determine if the number is Prim
    11·1 answer
  • What do we call stores in a physical world?
    13·1 answer
  • Pls answer will give brainlest dont answer if you dont know
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!