1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
10

An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m

alicious attacks from the network layer up through the application layer. Which of the following fulfills this requirement?
A.Blacklisting
B.Encryption
C.Lockout
D.Whitelisting
Computers and Technology
1 answer:
klio [65]3 years ago
4 0

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

You might be interested in
What connections do you see between variables and what you learned about the Input-Output-Store-Process model of a computer?
vladimir1956 [14]

Answer:

h

Explanation:

4 0
3 years ago
Dialogue is not a characteristic of functional text because...
kumpel [21]
It is b,<span>dialogue it's speech between characters, and there are no characters and functional text </span>
4 0
4 years ago
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
3 years ago
A video consists of a sequence of:
PolarNik [594]
A) Frames. Is the anwser!!
4 0
2 years ago
Whats the correct answer
dem82 [27]
Line 2 or line 4 sorry if I’m wrong
7 0
3 years ago
Read 2 more answers
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • What is the purpose of the chart feature in word?
    15·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • A ______ is a computer that controls access to the hardware, software, and other resources on a network. mainframe server workst
    10·1 answer
  • ........ is a formal description of message formats and the rules for exchanging those messages
    12·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​
    14·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • CreatePolicies<br> I need help with this in java.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!