1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
3 years ago
9

An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sendin

g packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue? A. Firewall; implement an ACL on the interface B. Router; place the correct subnet on the interface C. Switch; modify the access port to trunk port D. Proxy; add the correct transparent interface
Computers and Technology
1 answer:
lianna [129]3 years ago
4 0

Answer: (A)  Firewall; implement an ACL on the interface

Explanation:

 According to the question, for re-mediate the issue firewall should be implemented the ACL (Access control list) on the given interface. The access control list is one of the type of logic which selectively give permission or deny the number of packet in the system which to through the interface.

Firewall is the type of device that basically examine the traffic in the network system and also make several decisions in the system. ACL is the set of rule which mainly define the route of the packet in the router interface state.

You might be interested in
Which of the following is NOT a type of technology user? Digital Collaborator Media Mover Desktop Veteran Drifting Surfer Inform
MrRissso [65]
<span>C: is the answer  because its the onley one that dose not have some form of person in it </span>
6 0
4 years ago
You can undo up to the most recent 40 actions by clicking the undo button.
Cloud [144]
The answer is true. The Undo command is set up on the toolbar.  You can undo up to 40 edits in your plan by clicking on the Undo button.  If you want to undo all of the revises made, simply quit (close your Internet browser window or start a new plan) without saving. 
6 0
3 years ago
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the D
jasenka [17]

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

8 0
3 years ago
What is the name of the popular DBMS (database management system) that is open source and is distributed under the General Publi
Alex_Xolod [135]

Answer:

I looked it up on google and it said that one of the most popular ones is MySQL.

Explanation:

I don't know if it's right. I just looked it up on google.

6 0
3 years ago
The operating system software is necessary for a computer to function. true or false?
inysia [295]

Answer:

Yes.

Explanation:

Technically it depends on how you define "function". Usable? Yes, required. Turn on? No, not required. If there is no OS you'll get an error saying there is no boot disk/drive.

7 0
3 years ago
Other questions:
  • Which of the following filenames is acceptable on both Windows and Mac<br> operating systems?
    9·1 answer
  • Consider the situation you addressed in the previous question. Create numeric cost estimates for each of the costs you listed. C
    10·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • What is the Documenter?
    10·1 answer
  • Please help.
    6·1 answer
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • why when I click apostrophe I get an accent mark? And when I try quotation marks I get this ( ¨ ) how do I change that or why is
    13·1 answer
  • Which file types have exe and png as their extensions?
    10·1 answer
  • Jorge, a sports statistician for soccer, has kept track of how many shots-on-goal each player on a team made in each game. This
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!