1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
14

Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s

oftware application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing
Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
4 0

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

You might be interested in
How does our behavior change when we know we're being watched?
Hoochie [10]

I can't even say this is an answer

If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.

I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show

5 0
3 years ago
Outline 3 computer system problem that could harm people and propose the way avoid the problem​
Debora [2.8K]

Answer:

<em>outline 3 computer system problem that could harm people and propose the way avoid the problem</em><em> </em><em>a</em><em>r</em><em>e</em><em> </em><em>:</em><em>_</em>

  1. <em>Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could have a failing power supply. </em>
  2. <em>Abnormally Functioning Operating System or Software. </em>
  3. <em>S</em><em>low Internet.</em>

6 0
3 years ago
Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i
ser-zykov [4K]

Answer:

signature matching

Explanation:

Based on the scenario being described within the question it can be said that the process being described is known as signature matching. This process revolves around organizing, navigating through, and retrieving from software libraries in order to try and match to something that has already happened in order to better understand it and maybe prevent/stop the attack.

8 0
3 years ago
write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
trapecia [35]

Answer:

The program in C# is as follows:

using System;

class Prog {

 static void Main() {

   int n;

   Console.WriteLine("Number of integers: ");

   n = Convert.ToInt32(Console.ReadLine());

   int evensum = 0, oddsum = 0; int inpt;

   for(int i = 0;i<n;i++){

       inpt = Convert.ToInt32(Console.ReadLine());

       if(inpt%2==0){            evensum+=inpt;        }

       else{            oddsum+=inpt;        }

   }

    Console.WriteLine(evensum);

    Console.WriteLine(oddsum);

 }

}

Explanation:

This declares n, the number of integer inputs

   int n;

This prompts for n

   Console.WriteLine("Number of integers: ");

This gets input for n

   n = Convert.ToInt32(Console.ReadLine());

This declares and initializes the even and odd sum.

   int evensum = 0, oddsum = 0; int inpt;

This iterates through n

   for(int i = 0;i<n;i++){

This gets each input

       inpt = Convert.ToInt32(Console.ReadLine());

Check for even numbers and add,if even

<em>        if(inpt%2==0){            evensum+=inpt;        }</em>

Otherwise, add input as odd

<em>        else{            oddsum+=inpt;        }</em>

   }

Print even sum

    Console.WriteLine(evensum);

Print odd sum

    Console.WriteLine(oddsum);

 }

5 0
3 years ago
What information and options can be found on the File tab?
velikii [3]
<span> Microsoft Word and other Microsoft Office products the File tab is a tab on  that gives you access to file functions. For example, from the File tab you can access the Open, Save, Close, Properties, and Recent file options. I hope this helped and have a great day!!! :)</span>
5 0
3 years ago
Other questions:
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • Technlogies are having a negative impact on business true or false
    7·1 answer
  • Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow
    8·1 answer
  • Nina wants to create a digital backup of her holiday videos to view later. What two of these devices could she use?
    11·2 answers
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • 1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
    7·1 answer
  • If you have 60fps on your laptop tell me one way you can go to 240fps
    14·2 answers
  • Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
    8·1 answer
  • Route summarization means to make several smaller networks appear as
    6·1 answer
  • As a network engineer, you have been creating patch (straight-through) cables for a network switch. You have plugged in all the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!