1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
8

Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and

diagnosing and troubleshooting problems? a. security technician b. security analyst c. security consultant d. security manager
Computers and Technology
2 answers:
zimovet [89]3 years ago
7 0

Answer:

a. security technician.

Explanation:

In networking, security policies are implemented or configured to detect and prevent unauthorized access and cyber attacks in a network. To prove the gravity of this policy, it is penetration tested for hardening.

Security consultants and nanagers are responsible for drafting and documenting the much needed security policies of the company's private network, the security analyst analyses the performance of the implemented policies, while the security technician is responsible for technical implementation not the security policies drafted.

kondaur [170]3 years ago
5 0

Answer:

Security Technician

Explanation:

A secutity technician maintains security files by receiving, processing, and filing computer security forms; documents, and agreements. He/she also provides information by collecting, analyzing, and summarizing data and trends. They update job knowledge by participating in educational opportunities.

Cheers

You might be interested in
Speech on inventors and inventions
vlada-n [284]
Interntors present an interesting kind of people who think in peculiar ways sometimes. This ability allows them to view certain situations in ways in which other people cannot. Because of this, they can think of new ways of how such situations can be tackled. This is how inventions are born. A person with an inventive mind sees a new situation where he thinks of a new solution how he could improve this situation with his invention.

This process is continued continuously with new generations of inventors seeing and coming back to old situations over and over again, inventing new things along the way. 
4 0
3 years ago
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
What procedures are involved in saving a file for the first time
ratelena [41]
You must name the file and you must also choose where the file will be saved.

3 0
3 years ago
How do you post a picture on brainly? How do you also lower the points to like 5,brainless to the first understandable answers
Morgarella [4.7K]
To post a picture you just need to click on the clipper looking thing 
3 0
3 years ago
Web browsers communicate with web servers using the ____ communication protocol.
jolli1 [7]
It is the HTTP protocol.
7 0
4 years ago
Other questions:
  • How long does it take a letter to arrive?
    9·1 answer
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • In cell R9, enter a formula using the AVERAGEIF function to determine the average number of years of experience for lifeguards.
    12·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • __________ is the order of arrangement of files and folders.
    6·1 answer
  • List the types of infrared we have
    12·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • Refer to the image on the right. Then, using the drop-down menu, identify the correct printer type. A: inexpensive home printer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!