1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
4 years ago
6

To prepare for data collection for an SLR, what needs to be done about licenses and dynamic updates?

Computers and Technology
1 answer:
Shalnov [3]4 years ago
4 0

Answer:

Install license before the onsite eval installation, then set the software update to dynamic.

Explanation:

SLR (security lifecycle review) is an application platform that allow users access data or resources using prospect data to safely enable application, users and content.

There are various factors and installations to consider while using SLR, they are;

- Before you arrive onsite  with your eval unit.

- Coordinating the evaluation.

- Onsite eval install.

- Examining customer data.

- Closing the deal.

You might be interested in
People who want to hide data can also use advanced encryption programs, such as pgp or ____.
Vilka [71]
People who want to hide data can also use advanced encryption programs, such as pgp or Steganography.
7 0
3 years ago
In which tool can we create user and computer aaccounts; set their security policies and you can also apply group policies?
Gemiola [76]

Answer:

Group Policy Editor

Explanation:

4 0
3 years ago
What is the token generated when you create a snort rule that will detect outbound traffic using tcp to port 443 and 447?
Art [367]

The token generated if  you create a snort rule that will detect outbound traffic using TCP to port 443 and 447 is:

  • Alert TCP any any -> any 443 (message: "Test HTTP request alert"; sid:1000001;)

<h3>What is a Snort detection rule?</h3>

The Rules is known to be a kind of a different methodology that is known to be often used in the act of performing detection, and it is one that bring about the merit of 0-day detection to one's table.

Note that when compared to other forms of signatures, this rules are known to be based on knowing the actual vulnerability.

Hence, The token generated if  you create a snort rule that will detect outbound traffic using TCP to port 443 and 447 is:

  • Alert TCP any any -> any 443 (message: "Test HTTP request alert"; sid:1000001;)

Learn more about TCP from

brainly.com/question/17387945

#SPJ1

5 0
2 years ago
Vincent is a digital media professional. His bosses always praise his artwork. His company has just taken on a new project. Vinc
Zielflug [23.3K]

Answer:

A

Explanation:

I think the answer in A

5 0
3 years ago
Which are ways to move data, either by moving completely or copying into a new location? Check all that apply.
Tems11 [23]
Select data, press Control + C on the keyboard, select a target location, and press Control + V


It just like copy and paste
3 0
4 years ago
Read 2 more answers
Other questions:
  • What are the six external parts of a computer system and identify which are input and which are output?
    8·1 answer
  • Malware or malicious software does not include which of the following? A. Spyware B. Trojan Horses C. Computer viruses D. New so
    8·2 answers
  • Which of the following Office Online apps is most effective for creating spreadsheets?
    14·1 answer
  • What is the name for the warmth or coolness of white light?
    10·1 answer
  • The decimal system was invented by the ____ empire.
    14·1 answer
  • A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
    10·1 answer
  • 1. The Law of Superposition – the age of an object may be determined by the depth at which it is found, the deeper the object is
    14·1 answer
  • Write an Assembly program in MIPS that does the following:
    7·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • What percentage of teens say they have witnessed cyberbullying?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!