1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
7

Which vendor certification would you think is the most relevant in the field of IT security? Why?

Computers and Technology
1 answer:
Travka [436]3 years ago
3 0

Answer:

Certified Ethical Hacker

Explanation:

To maintain the confidentiality and integrity of the data , information, etc Information Technology security is of utmost importance thus preventing the harms and losses of an organization.

Certified Ethical hacker abbreviated as CEH is most relevant in the IT security sector.

EC- Council offered CEH, an intermediate level vendor certification, a must have for the security of IT organizations and the ethical hacking professionals.

It gives a demonstration of the information on assessing a system's security, vulnerabilities of a system,etc.

It became inevitable for the It sector as it faced breeches of security worldwide in the year 2018.

CEH credentials have sound knowledge and are skilled in hacking practices in the fields like firewalls, evading IDs, cryptography, Trojan, denial-of-service attacks, system hacking,etc

You might be interested in
MinMax is a function that takes five arguments and returns no value. The first three arguments are of type int. The last two arg
Luba_88 [7]

Answer:

#include <iostream>

using namespace std;

void MinMax(int x,int y,int z,int *max,int *min)

{

   int big,small;

   if((x>y)&&(x>z))    //to check for maximum value

       big=x;

   else if((y>x)&&(y>z))

       big=y;

   else

       big=z;

   if((x<y)&&(x<z))  //to check for minimum value

       small=x;

   else if((y<x)&&(y<z))

       small=y;

   else

       small=z;

   *max=big;   //pointer pointing to maximum value

   *min=small;     //pointer pointing to minimum value

}

int main()

{

   int big,small;

   MinMax(43,29,100,&big,&small);    

   cout<<"Max is "<<big<<"\nMin is "<<small;  //big and small variables will get value from method called

   return 0;

}

OUTPUT :

Max is 100

Min is 29

Explanation:

When the method is called from first three integers maximum will be found using the conditions imposed and maximum value will be found and similarly will happen with the minimum value.

5 0
3 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
4. Write a program which selects two integer numbers randomly, adds the numbers and asks the user to enter the answer and then c
KIM [24]

Answer:

import random

number1 = random.randrange(0, 1000)

number2 = random.randrange(0, 1000)

answer = int(input("Enter a number: "))

if answer == number1 + number2:

   print("Your answer is correct")

else:

   print("Your answer is not correct")

Explanation:

The code is in Python

Create two integer numbers using random

Ask the user for an input

Check if answer is equal to number1 + number2. If they are equal, print "answer is correct". Otherwise, print "answer is not correct".

7 0
3 years ago
Please I have been having a problem with this assignment of mine but I have not gotten an answer. Idiot know if anybody could be
ICE Princess25 [194]

Answer:

ummm

Explanation:

your on your own it doesn't makes since

3 0
3 years ago
Other questions:
  • "what do you perform when you want to recall specific records from a database"
    13·1 answer
  • What are the three types of event logs generated by windows 2003 and vista systems?
    12·1 answer
  • What would you need to install if you have an app that is incompatible with your current operating system?
    13·1 answer
  • The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat
    9·1 answer
  • Which type of device often controls IoT tasks?<br> Desktop<br> Laptop<br> Smartphone<br> Switch
    8·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • If Jake wants to find out if the size of a fruit has any effect on the total sales for the week of that particular fruit, what c
    15·1 answer
  • Define computer memory and write its type <br>​
    10·2 answers
  • Is computing gcse easy or hard
    10·2 answers
  • It is most commonly used for self-running presentations.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!