1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
4 years ago
15

After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to

the breach. Which of the following steps in the incident response process has the administrator just completed?
A. Containment
B. Eradication
C. Recovery
D. Identification
Computers and Technology
1 answer:
patriot [66]4 years ago
5 0

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
You might be interested in
Satırlar ve sütunların kesişmesiyle oluşan kutular aşağıdakilerden hangisidir
Kryger [21]

Answer:

Huh English please......

7 0
3 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
List two examples of following types of communication
bija089 [108]
Verbal Communication. Verbal communication occurs when we engage in speaking with others. ...
Non-Verbal Communication. What we do while we speak often says more than the actual words. ...
3 0
3 years ago
Read 2 more answers
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to hel
igomit [66]

Answer:

Business intelligence.

Explanation:

That concept that applies to that of the selection, incorporation, evaluation, and analysis of companies or business information systems, software, and behaviors. It is direct at promoting good business decision-making.

This is a wide concept of software and technology to capture, store, analyze, and to provide information access to support users make far better strategic decisions.

6 0
3 years ago
Other questions:
  • How to Print output in JavaScript
    8·1 answer
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems t
    9·1 answer
  • In the Word 2016 window, where is the Status bar located?
    8·1 answer
  • What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
    13·1 answer
  • Most hand sewing begins and ends with
    5·1 answer
  • How do the companies gather data to determine common passwords?
    13·1 answer
  • Which problem is least likely to be solved through grid computing?.
    9·1 answer
  • When a linked chain contains nodes that reference both the next node and the previous node, it is called a(n)?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!