Answer:
b. when you have completed a document
As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.
<h3>
What is indicators?</h3>
System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.
IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.
Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.
Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.
To learn more about indicators, refer to the link:
brainly.com/question/28093573
#SPJ1
Answer:A lot of people cry when they cut an onion. The trick is not to form an emotional bond.lol
Answer:
b. Synchronous replication
Explanation:
Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.
There are two categories of replication and they are synchronous and asynchronous replication.
Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.