1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
4 years ago
8

Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re

ad­many (WORM) storagec. Unified Threat Management (UTM)d. Firewall logging
Computers and Technology
1 answer:
Neporo4naja [7]4 years ago
5 0

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

You might be interested in
In three to four sentences, describe why CEOs (the chief executive officers, that is, the leaders of large companies) make very
mixer [17]
Well, CEOs are on the top of the food chain. It takes a lot of work and ambition to become one, and once they are one, <span>CEOs accept a huge amount of responsibility - that means having to take blame if things go wrong and </span><span>having more tasks to complete such as having to attend numerous meetings, make decisions. They are also on the board of directors.</span>

Assistants do not have to do as much, they likely won't have that much responsibility or experience, their tasks revolve around ensuring meetings are scheduled and performing other ad-hoc duties.
5 0
4 years ago
Explain the working system of computer systems with examples​
geniusboy [140]

,I don't know you all about computer

8 0
3 years ago
Daria would like a certain company to publish her math book. She creates a presentation about the features and benefits of using
lisabon 2012 [21]

Answer:

B: A business proposal

Explanation:

4 0
3 years ago
Read 2 more answers
PLEASE HELP!!!!!!!!!!
SCORPION-xisa [38]
I don’t know if u tried this yet but maybe acetone can help or vinegar?
8 0
3 years ago
Read 2 more answers
Edhesive Assignment 4: Student Schedule... Please help, it would be appreciated. At this point I am so desperate I am willing to
ELEN [110]

Answer:

# This assignment requires you to ask for the first name and last name, and then the class number and room number  

First_Name = input("first name ")

Last_Name = input("last name ")

Student_ID = input("Student ID: ")

print("+++++++++++++++++++++++++++++++++++++++++++++++++")

print("+\t\t" + last_Name + ", " + first_Name + "\t\t" + "Student ID: " + student_ID + "\t\t\t+")

print("+                                               +")

print("+++++++++++++++++++++++++++++++++++++++++++++++++")

print("*                                               *")

schdule = input("Enter, STOP to end Your Next Class: ")

block_Num = 0

while schdule != "STOP":

  block_Num += 1

  class_Num = input("Input room no.: ")

  print("*\t\t" + "Block " + str(block_Num) + ": " + schdule + "\t\tRoom: " + class_Num + "\t\t*")

  schdule = input("Enter STOP to end, next class: ")

   

print("+                                               +”)    

print("+++++++++++++++++++++++++++++++++++++++++++++++++")

# END #

The program asks the student to enter the student name (first and last) and then enter the room number, and the block number, till the schedule ends or is equal to STOP.

Rest is explained by STOP itself.

Explanation:

The answer does not require any further explanation.

4 0
3 years ago
Other questions:
  • In data flow diagrams, an individual who originates data is:
    15·1 answer
  • What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
    9·1 answer
  • Which folders are commonly used in the navigation pane of outlook
    5·1 answer
  • 1. Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment
    5·1 answer
  • Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
    12·1 answer
  • To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?
    6·2 answers
  • (2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
    12·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • Write a C program to insert and delete values from a stack(to perform pop and push operations) using an array data structure
    10·1 answer
  • My sister told me an extremely funny joke. what is the direct object for this sentence ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!