1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
11

Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw

anted services), change control, and log management.
Computers and Technology
1 answer:
xeze [42]3 years ago
6 0

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

You might be interested in
List and describe three options in the autocad object snap toolbar
miv72 [106K]
<span>END POINT : Snaps to the closest endpoint or corner of a geometric object. MID POINT : Snaps to the midpoint of a geometric object. CENTER : Snaps to the center of an arc, circle, ellipse, or elliptical arc.</span>
6 0
3 years ago
Write a code snippet Now write your own code snippet that asks the user to enter two numbers of integer type (one at a time) and
taurus [48]

Explanation:

num1= print("Enter a number :")

num2 = print("Enter a number :")

sum = num1 + num2

print(sum)

4 0
2 years ago
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
3 years ago
Which processor interrupts the system 18.2 times per second? What are some of its practical uses?
julsineya [31]

Answer:

timer interrupt

Explanation:

A timer is an interrupt that is generated by the PC's system timer.When this interrupt occurs, the ROM BIOS interrupt handler is called and it increments a count in the ROM BIOS.It interrupts the system 18.2 times per second.It is used for multitasking.Hence we conclude that timer interrupt is the answer.

6 0
3 years ago
Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
ycow [4]
Here i found this link that might help!
https://study.com/academy/lesson/the-differences-between-fuses-circuit-breakers.html

Have a nice day!
3 0
3 years ago
Other questions:
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • The World Wide Web consists of interconnected computer networks throughout the world that everyone can use. True or False
    13·2 answers
  • Which windows tool can you use to find out if the hard drive is slowing down windows performance?
    9·1 answer
  • After Lola gave her friend the password to a protected website, her friend was able to remember it only long enough to type it i
    7·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • What programming language does the LMC 'understand'?
    5·1 answer
  • Please answer this question​
    8·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!