1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
8

Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and

diagnosing and troubleshooting problems? a. security technician b. security analyst c. security consultant d. security manager
Computers and Technology
2 answers:
zimovet [89]3 years ago
7 0

Answer:

a. security technician.

Explanation:

In networking, security policies are implemented or configured to detect and prevent unauthorized access and cyber attacks in a network. To prove the gravity of this policy, it is penetration tested for hardening.

Security consultants and nanagers are responsible for drafting and documenting the much needed security policies of the company's private network, the security analyst analyses the performance of the implemented policies, while the security technician is responsible for technical implementation not the security policies drafted.

kondaur [170]3 years ago
5 0

Answer:

Security Technician

Explanation:

A secutity technician maintains security files by receiving, processing, and filing computer security forms; documents, and agreements. He/she also provides information by collecting, analyzing, and summarizing data and trends. They update job knowledge by participating in educational opportunities.

Cheers

You might be interested in
Sabian que hay una violadora sexuar el nombre de usario es SASHENKAFASION me acaba de decir que hackio en donde vivo,mi nombre c
grin007 [14]
Gracias por avisar eres muy amable
4 0
3 years ago
Can you please answer the question in the picture ! :)
Ilya [14]

Answer:

Explanation: If and else statements are one of the most important parts of programming.

1. You add an if you do something if a condition is met. For example, if number of chocolates equals zero( a condition), and inside you can do something like buy more chocolates. And else statement happens if the if condition isn't met and you want to the code to do something else. You don't need this if you don't want anything to happen if the if condition isn't true.

2. This might be used in a number guessing game. Let's say you have to guess a number, if its correct the computer should correct but if you get it wrong it should display wrong. You can write if the number the user writes in equal to the number you are supposed to guess say correct. Else say wrong

Hope this helps. Please mark as brainliest! Thanks!

4 0
3 years ago
What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of deli
Serga [27]

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

brainly.com/question/18696862

#SPJ1

6 0
1 year ago
12While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The change
AfilCa [17]

Answer:

Issue the reload command without saving the running configuration.

Explanation:

5 0
3 years ago
Why is it important not to leave your personal information on a public computer?
zheka24 [161]

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

7 0
1 year ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
    13·1 answer
  • What is the purpose of a system call in an operating system?
    10·1 answer
  • A computer (mainframe, server, or workstation) that has an operating system enabling _____________ to access it at the same time
    11·1 answer
  • Accessing a computer system by using several words is known as​
    13·2 answers
  • Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number an
    7·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!