1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
10

An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m

alicious attacks from the network layer up through the application layer. Which of the following fulfills this requirement?
A.Blacklisting
B.Encryption
C.Lockout
D.Whitelisting
Computers and Technology
1 answer:
klio [65]3 years ago
4 0

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

You might be interested in
User 2.0 is most likely to Multiple Choice passively read and search for content. depend on content creators and avoid expressin
Ahat [919]

User 2.0 is most likely to: use the Internet for social connection.

<h3>What is User 2.0?</h3>

User 2.0 which is an aspect of Web 2.0 defines the latest form of the internet that allows users to interact with each other. This form of the internet is easy to use and requires participation by users.

So, a possible feature of User 2.0 will be the ability to use the internet for socialization.

Learn more about User 2.0 here:

brainly.com/question/3913924

5 0
3 years ago
¿Cuáles son las ventajas de manejar la nube?
igomit [66]

Answer:

What are the advantages of managing the cloud=(Englishish)What are the advantages of managing the cloud?

Lower IT Costs. Businesses requiring IT services save money using third-party providers vs bringing talent in-house. ...

Computing Resources. Heavy computation cycles need extensive hardware resources. ...

Accessibility. ...

Always Updated. ...

Scaling. ...

Backup/Recovery. ...

Integration. ...

Security.

In spanish.....  (Costos de TI más bajos. Las empresas que requieren servicios de TI ahorran dinero utilizando proveedores externos en lugar de traer talento internamente. ...

Recursos informáticos. Los ciclos de computación intensos necesitan amplios recursos de hardware. ...

Accesibilidad. ...

Siempre actualizado. ...

Escalada. ...

Recuperación de respaldo. ...

Integración. ...

Seguridad.)

Explanation:

8 0
3 years ago
After a suspected identity fraud case has been resolved, you should: AContinue to monitor your credit reports and accounts. BKee
AysviL [449]
The answer is C. Both A and B because in the case of identity fraud it would make sense to monitor both
4 0
3 years ago
Read 2 more answers
Question 4 (1 point)
Leno4ka [110]

Answer:

I need the know what "the following" are! Then I can answer!

Explanation:

6 0
3 years ago
Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so t
goblinko [34]

Answer:

The correct answer to the following question will be Option C (Entry control roster).

Explanation:

A roster for entry controls includes a list of identities and descriptions of people that are going to access. A guard might have a list of recognized staff approved to connect a network channel capability or region.

  • Someone who tries to enter the region will indeed be reviewed, and then they will be refused access unless their identity isn't even on the list.
  • Once people visit, they'll need to display the credentials of the security officer that allows everyone to access the server farm.

So, it's the right answer.

8 0
3 years ago
Other questions:
  • If you know the unit prices of two different brands of an item you are better able to
    8·1 answer
  • The logical view of a database system refers tohow a user or programmer conceptually organizes and understands the data. how the
    5·1 answer
  • The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your
    12·1 answer
  • Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
    11·1 answer
  • The undo button allows you to reverse up to ____ previous actions, one at a time.
    14·1 answer
  • Use HTML to create a web page
    10·1 answer
  • Which of the following that can be use to access session variables in PHP?
    14·1 answer
  • Read the excerpt from Act 111, scene iii of Romeo and Juliet. Which is the best paraphrase of this dialogue
    11·1 answer
  • Erewrxdnnefwn q wedsvd
    6·1 answer
  • Felicia's Wi-Fi connection to her phone is extremely slow. However, her
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!