1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
8

Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and

diagnosing and troubleshooting problems? a. security technician b. security analyst c. security consultant d. security manager
Computers and Technology
2 answers:
zimovet [89]3 years ago
7 0

Answer:

a. security technician.

Explanation:

In networking, security policies are implemented or configured to detect and prevent unauthorized access and cyber attacks in a network. To prove the gravity of this policy, it is penetration tested for hardening.

Security consultants and nanagers are responsible for drafting and documenting the much needed security policies of the company's private network, the security analyst analyses the performance of the implemented policies, while the security technician is responsible for technical implementation not the security policies drafted.

kondaur [170]3 years ago
5 0

Answer:

Security Technician

Explanation:

A secutity technician maintains security files by receiving, processing, and filing computer security forms; documents, and agreements. He/she also provides information by collecting, analyzing, and summarizing data and trends. They update job knowledge by participating in educational opportunities.

Cheers

You might be interested in
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
lukranit [14]
I guess it will be 4 yards each hopes it will help u :)
4 0
2 years ago
Which of the following things should you do first when planning your career?
Yanka [14]
Definitely D, if you want a career that will make you happy you should make a list of your job preferences and skills
8 0
3 years ago
Read 2 more answers
_______ are fasteners that connect parts and are intended to resist pulling forces. A. Extension springs B. Compression springs
madam [21]
The answer is Lock washers
6 0
4 years ago
To get a sense of your digital footprint, you should:
Serggg [28]
Google yourself once a year.
4 0
4 years ago
Read 2 more answers
Other questions:
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • Make a program (C++). Sum of a 4 digits number and eliminating last digitsȘ
    13·1 answer
  • ¿dispositivos de hardware Que permite identificar la huella digital registrada por el usuario?
    11·1 answer
  • You have just replaced the motherboard in your computer. now your computer will not start. you press the power button on the sys
    6·1 answer
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • A general rule for printing is to use _____ fonts for headlines and serif fonts for body text
    6·1 answer
  • What does pdf stand for?
    10·1 answer
  • Calculate how much disk space (in sectors, tracks, and surfaces) will be required to
    14·1 answer
  • Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres
    6·1 answer
  • how to make windows laptop work faster because I mine is so slowwwww. I already updated it and everything and tried everything b
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!