1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
11

An attacker distributes hostile content on Internet-accessible Web sites that exploit unpatched and improperly secured client so

ftware running on victim machines. Which of the SANS Critical Security Controls is primarily affected
Computers and Technology
2 answers:
nignag [31]3 years ago
6 0

Answer:

Inventory of authorised and unauthorised devices

Explanation:

There are about 20 SANS critical security controls, one of which is the inventory of authorised and unauthorised devices.

This is understood to be the act of

to earnestly running and engaging all hardware devices present on the network to make sure that only authorized devices are given access to the network.

The moment the attacker distributed hostile content on Internet-accessible web sites, this means that foreign agents have been introduced to the network and these agents are there to act as spyware or malware on the network.

Inventory of authorised and unauthorised devices includes tracking of any unauthorized and unmanaged devices like the one illustrated above in order to prevent them from gaining access to the network.

julia-pushkina [17]3 years ago
5 0

Answer:

Since the attack impacts the client SANS Critical Security Controls. This act affects the Inventory of authorized and unauthorized software running on the victim's machine.

You might be interested in
To navigate to a new web page for which you know the url, type that url in the browser’s ____ bar and press enter.
Slav-nsk [51]
It would be to type the url in the browser's address bar
3 0
3 years ago
Shapes in the Shapes gallery can be combined to show relationships among the elements.
LUCKY_DIMON [66]
Yes, this statement is true.
Actually this statement is about using Microsoft PowerPoint, shapes in the shape gallery can be combined to show relationships among the elements.
In the shape gallery of Microsoft PowerPoint, there are many shapes such as oval, square, rectangle, star, line and many more. One can use any shape to illustrate the concept or to show relationship between something.
8 0
3 years ago
What is a client benefit of partnering with Accenture's Intelligent Platform Services<br> (IPS)?
charle [14.2K]
It’s a bot Bc when you do stuff you can believ it
8 0
2 years ago
if i were to plug this in my ps4 usb port and connect it to the tv would it work please and if so please explain
Brilliant_brown [7]
Probably, most likely yes. this is just basically adding a bit of extra length. the ps4 port goes in the end and the part for the tv acts as a hdmi cord.
4 0
3 years ago
Read 2 more answers
What is network topology​
Fynjy0 [20]
DescriptionNetwork topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
3 0
3 years ago
Other questions:
  • In a Comparative Government course, the first unit focuses on the US Congress and the
    8·1 answer
  • What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
    12·1 answer
  • Your friend’s parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    10·2 answers
  • A new product was introduced in 2003, which functions as both an identification device and a medium of communication. It uses in
    8·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    9·1 answer
  • ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
    11·1 answer
  • What is an advantage of a computer network ? networked
    13·2 answers
  • What is computer. Write full form of mips​
    15·1 answer
  • What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-
    14·1 answer
  • How do you find binary?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!