1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
9

An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed cryptocurrency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?
A. Remove the affected servers from the network.
B. Review firewall and IDS logs to identify possible source IPs.
C. Identify and apply any missing operating system and software patches
D. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
Leya [2.2K]3 years ago
3 0

Answer:

The correct answer is B  

Explanation:

Containment is a system of security whereby all form of access on the information technology system (to files, information, networks etc) is controlled through points of entry or access.

By reviewing firewall and Intrusion detection systems (IDS) logs to identify the possible source of the intrusion, the company can truncate access into their network by the hacker.

Cheers!

You might be interested in
Select the best answer to the following question.
Fittoniya [83]

Answer:

I think its called "cloud computing"

8 0
3 years ago
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair
Viefleur [7K]

Answer:

scores.append(6,2)

Explanation:

This is a complicated question because in theory, scores.insert can also add values, but I am sure that the only line of code that would work is scores.append(6,2)

7 0
3 years ago
Start
Crank

Answer:

N=5  key task decision start and end

Explanation:

8 0
3 years ago
Contrast the following terms (provide examples): Partial dependency; transitive dependency
kiruha [24]

Answer:

Explanation:

Transitive dependency

In this case, we have three fields, where field 2 depends on field 1, and field three depends on field 2.

For example:

Date of birth --> age --> vote

Partial dependency

It is a partial functional dependency if the removal of any attribute Y from X, and the dependency always is valid

For example:

Course and student these tables have a partial dependency, but if we have the field registration date, this date will depend on the course and student completely, we must create another table with the field registration date to remove this complete dependency.

If we remove or update the table registration date, neither course nor student must not change.

5 0
3 years ago
In what service does the customer order,pickup, and pay at the desk
Crank

Answer:

monye

Explanation:

cash or credit becuse with what else are they gonna pay with

8 0
3 years ago
Other questions:
  • An OR function nested in an IF function results in
    11·1 answer
  • Once you select select a crop boundary, you can no
    15·1 answer
  • What is a directory server?
    5·1 answer
  • In addition to the four primary computer operations, today's computers almost always perform ____ functions.
    7·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • For this exercise, you'll use the Rectangle class below (you can assume that the length and width are measured in feet).
    12·1 answer
  • How do you close a file?
    12·2 answers
  • . Which responsibility belongs to the marketing function?
    11·1 answer
  • How to tell if your phone is being monitored
    12·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!