1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
4 years ago
15

After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to

the breach. Which of the following steps in the incident response process has the administrator just completed?
A. Containment
B. Eradication
C. Recovery
D. Identification
Computers and Technology
1 answer:
patriot [66]4 years ago
5 0

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
You might be interested in
Computer-aided design software is used primarily by:
guapka [62]
Is used primarily by Students and Engineers.
4 0
4 years ago
Explain with examples: <br> What are the reasons of a successful and unsuccessful software project?
Darina [25.2K]

Answer:

A good starting point is by addressing some of the key reasons software projects fail.

Explanation:

Not Enough Time. ...

Insufficient Budget. ...

Poor Communication. ...

Never Reviewing Project Progress. ...

Inadequate Testing. ...

Testing in the Production Environment. ...

Lack of Quality Assurance. ...

Not Conforming to Industry Standards.

6 0
3 years ago
Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understoo
natulia [17]

Computers that communicate over a network must follow certain <u>protocols or rules</u>, in order to ensure that data are transmitted properly and understood.

<h3>What is a protocol?</h3>

A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).

In Computer networking, all computers and other network devices that communicate over a network must follow certain <u>protocols</u><u> or rules</u>, in order to ensure that data are transmitted properly and well understood by end users.

Read more on protocol here: brainly.com/question/17387945

8 0
2 years ago
What is autofill in a excel spreadsheet?
Digiron [165]
Autofill is to automaticlly put the information in a spreadsheet
5 0
3 years ago
What can a human till do better and fater than any Machine Learning (ML) olution?
Gemiola [76]

Judge the quality of any given data can a human till do better and fater than any Machine Learning (ML).

<h3>What is Machine Learning (ML)?</h3>
  • Switch between fields of expertise. a thorough understanding of the facts' meaning. Check the veracity of any information that is provided.
  • According to some scientists, AI will replace jobs with a single output. A mental task may also be mechanized in the future if it can be finished by a person in less than a second.
  • Expressing empathy, making others feel good, taking care of others, expressing feelings and vulnerability in a sympathetic way, and making people laugh are all examples of being creative and artistic for the purpose of being creative. The personal touch is important in most occupations and, in certain cases, it completes the task entirely.
  • Machines can perform as well as or better than humans in some tasks, despite their slower rate of development.

To learn more about Machine Learning (ML) refert to:

brainly.com/question/25523571

#SPJ4

5 0
1 year ago
Other questions:
  • In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
    8·1 answer
  • If you find yourself in a position where you need to restore an object or container within active directory that has been inadve
    6·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • For delivering a message that is straightforward and informative, a face-to-face encounter is preferred over a technological cha
    8·1 answer
  • Which of the following statements about the break statement is false? Group of answer choices Common uses of the break statement
    12·1 answer
  • True or false mobile devices need to work within limited screen space
    6·2 answers
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
    10·1 answer
  • 1. Write a programme to print the Fees Receipt of English High School Required Inputs Name of the Student Monthly Tuition Fees M
    10·1 answer
  • Older systems that often contain data of poor quality are called ________ systems.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!