1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
8

Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and

diagnosing and troubleshooting problems? a. security technician b. security analyst c. security consultant d. security manager
Computers and Technology
2 answers:
zimovet [89]3 years ago
7 0

Answer:

a. security technician.

Explanation:

In networking, security policies are implemented or configured to detect and prevent unauthorized access and cyber attacks in a network. To prove the gravity of this policy, it is penetration tested for hardening.

Security consultants and nanagers are responsible for drafting and documenting the much needed security policies of the company's private network, the security analyst analyses the performance of the implemented policies, while the security technician is responsible for technical implementation not the security policies drafted.

kondaur [170]3 years ago
5 0

Answer:

Security Technician

Explanation:

A secutity technician maintains security files by receiving, processing, and filing computer security forms; documents, and agreements. He/she also provides information by collecting, analyzing, and summarizing data and trends. They update job knowledge by participating in educational opportunities.

Cheers

You might be interested in
Benching system are prohibited in
enyata [817]
Providence yep ur welcome
3 0
3 years ago
________ management is a process of controlling changes in system requirements during software development.
Brums [2.3K]
<span>Change Control (CC) management is a process of controlling changes in system requirements during software development. </span>
8 0
3 years ago
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
Three popular types of ____ are handheld computers, PDAs, smart phones.
m_a_m_a [10]

Answer:

portable media players, and digital cameras

Explanation:

4 0
3 years ago
How can a broadcast station be received through cable and satellite systems?
swat32

Metadata is data (information) about data.



The <meta> tag provides metadata about the HTML document. Metadata will not be displayed on the page, but will be machine parsable.



Meta elements are typically used to specify page description, keywords, author of the document, last modified, and other metadata.



The metadata can be used by browsers (how to display content or reload page), search engines (keywords), or other web services.




3 0
4 years ago
Other questions:
  • Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school
    15·1 answer
  • The process of recognizing information? needs, using efficient search techniques to locate reliable sources of? information, and
    9·1 answer
  • Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP
    12·1 answer
  • Wats is a internal disk drive​
    10·2 answers
  • Which of the following statements is false?a.Unethical behavior is always illegal.b.Ethical decisions are usually influenced by
    12·1 answer
  • 10 disscused reasons why organisatoions use electronic spreedsheet​
    14·1 answer
  • Identify one technology tool used for work​
    7·1 answer
  • Websites not only give us information, but they also inspire designers in their layouts, illustrations, images, typefaces, and c
    6·1 answer
  • SmartArt is especially useful for which types of objects? Check all that apply.
    10·2 answers
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!