1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
11

An attacker distributes hostile content on Internet-accessible Web sites that exploit unpatched and improperly secured client so

ftware running on victim machines. Which of the SANS Critical Security Controls is primarily affected
Computers and Technology
2 answers:
nignag [31]3 years ago
6 0

Answer:

Inventory of authorised and unauthorised devices

Explanation:

There are about 20 SANS critical security controls, one of which is the inventory of authorised and unauthorised devices.

This is understood to be the act of

to earnestly running and engaging all hardware devices present on the network to make sure that only authorized devices are given access to the network.

The moment the attacker distributed hostile content on Internet-accessible web sites, this means that foreign agents have been introduced to the network and these agents are there to act as spyware or malware on the network.

Inventory of authorised and unauthorised devices includes tracking of any unauthorized and unmanaged devices like the one illustrated above in order to prevent them from gaining access to the network.

julia-pushkina [17]3 years ago
5 0

Answer:

Since the attack impacts the client SANS Critical Security Controls. This act affects the Inventory of authorized and unauthorized software running on the victim's machine.

You might be interested in
Less than 40 percent of teens have used marijuana within the past year. True or false?
fgiga [73]
That is true. I hope this helps
6 0
2 years ago
Which situation is an example of? "relational context" in the transactional model of? communication?
Jlenok [28]
An example I believe of relational context is when I was out with my son on the weekend (he has a developmental disability) and we had agree I would buy him a 1/2 sub sandwich the day before but then he said I would like a McFlurry so I said okay and then he said so you mean I can have a McFlurry and a sub and I thought oh oh I stuck my foot in it so I said but it must be only a 1/2 sub so he said no I want a full sub then and no mcflurry so I agreed so from the original 1/2 sub idea the idea evolved to a full sub which was affected by the warm sunny summery weather in the afternoon and seeing people lined up at ice cream shops so the idea developed in relation to the weather, how hungry he was and the social aspect people buying ice cream.
8 0
2 years ago
What is TCP/IP's Transport layer's primary duty?
lorasvet [3.4K]

Answer:

 The TCP/IP is the transmission control protocol and internet protocol and in the TCP/IP model the transport layer is the second layer.

The primary responsibility of this layer is that it is basically used to deliver messages to the host and that is why it is known as end to end layer.

It basically provide the point to point connection between the destination to server host for delivering the various types of the services efficiently and reliably.

In the TCP/IP model the transport layer are basically responsible for transferring the data or service error free between the server to destination host.

3 0
3 years ago
Http://www.alegrium.com/sgi/2/eibder
Flura [38]

Answer:

so what is this uhhhhhhhhhh

7 0
2 years ago
Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
wolverine [178]
A do you think is the answer
4 0
2 years ago
Read 2 more answers
Other questions:
  • You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
    8·1 answer
  • When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
    7·2 answers
  • What are the possible consequences of intentional virus setting?
    14·1 answer
  • Describe the job of an Architect.
    5·2 answers
  • JUST MAXED OUT THE COMMENTS anyways come here
    7·2 answers
  • Write pseudocode for the question below:
    15·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
  • 4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of
    12·1 answer
  • Write l for law of enrtia,ll for law of Acceleration and lll for law of enteraction.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!