1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
14

Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s

oftware application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing
Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
4 0

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

You might be interested in
Environmental technology examples
meriva

Exhaust Gas Recirculation (EGR) for NOx control
<span>Positive Crankcase Ventilation (PCV) for HC emission control </span>
Evaporative Emissions Control(EVAP)
<span>Catalytic Converter for HC and NOx control</span>
6 0
4 years ago
A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied di
RoseWind [281]

Answer:

dynamic

Explanation:

A dynamic web page serves out varied material to various visitors while keeping the same layout and appearance. These pages, which are often built in AJAX, ASP, or ASP.NET, require longer to render than plain static sites. They are commonly used to display data that updates regularly, such as weather forecast or market prices.

Dynamic web pages often incorporate software applications for various services and need server-side resources such as databases. A database enables the page builder to divide the design of the website from the content that will be presented to users. When they post material to the database, the website retrieves it in response to a user request.

5 0
2 years ago
Everyone interacts with various information systems every day: at the grocery store, at work, at school, even in our cars. Make
Alex73 [517]

Answer:

- RFID tags in shopping mall.

- Browsing the internet.

- Mobile phone calls

Explanation:

Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.

The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.

Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.

5 0
4 years ago
A server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and we
Basile [38]

Answer:

true

Explanation:

6 0
3 years ago
Read 2 more answers
Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems
natulia [17]

Answer:

analysis

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following should you always wear to avoid being thrown from a vehicle and then crushed if it tips over?
    12·2 answers
  • All java classes must contain a main method which is the first method executed when the java class is called upon.
    10·1 answer
  • Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highe
    6·1 answer
  • What is the name of a button on a website?
    11·1 answer
  • A storyboard is an example of an implementation tool.
    8·1 answer
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
    15·1 answer
  • Analyze the following output public class Test{ public static void main(String args[]){ int[] x={1,2,3,4}; //here declare array
    9·1 answer
  • Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do
    8·1 answer
  • 3 ways that can be used to connect computers to a network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!