1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
11

Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw

anted services), change control, and log management.
Computers and Technology
1 answer:
xeze [42]3 years ago
6 0

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

You might be interested in
Explain
Charra [1.4K]

Answer:

The main difference between LAN, MAN and WAN is the scope and coverage of the networks. LAN (Local area network) is usually used to connect computers in smaller distances such as in a building or in offices. They use various topologies such as bus topology, ring topology, star typology etc to connect the computers and share information only among the computers connected in LAN. A Metropolitan Network covers larger coverage than LAN and is usually used for connecting a city rather than single organization. A Wide Area Network is collection of networks or many LANS. The perfect example of WAN is internet which connects thousands and millions of networks. Another factor which distinguishes between LAN, MAN and WAN is that LAN and MAN are owned by certain entities such as government, educational institutions or organizations whereas WAN (i.e. Internet) is not owned by anyone.

4 0
3 years ago
What do u call a individual that loves motor bikes and leather and is in a rival group known as mods?
vladimir1956 [14]
My best guess would be a biker they love motor bike they wear leather jackets and ride in groups this is the only thing i could think of

~ thanks ~
7 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Czy FALL GUYS będzie działało szybko na i5 GH8? Na ilu FPS?
Lesechka [4]

Answer:español por favor asi te responderé y gracias por los 10 puntos chaoo

Explanation:

6 0
3 years ago
What is the penalty for violating section 1201 of title 17 chapter 21 of the us code
svlad2 [7]

Prison or juvenile detention of course, its a violation

4 0
3 years ago
Other questions:
  • 1.
    12·1 answer
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
    5·2 answers
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    13·1 answer
  • BRAINLEST AND 20 POINTS! Most GUls provide all of the following except
    6·2 answers
  • Which of the following statements tests if users walked 10,000 or more steps and ate fewer than 25 grams of sugar?
    9·1 answer
  • Raul is a 13-year-old teenager interested in taking up photography as a new hobby. His dad wants to buy him a camera for his bir
    13·1 answer
  • Why is it useful to understand coding fundamentals even if you work in a game design role that doesn’t traditionally write code?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!