1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
7

A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir

ed by law to notify law enforcement. What should the security manager do first to preserve non-volatile evidence on the server
Computers and Technology
1 answer:
Andre45 [30]3 years ago
6 0

Answer: disconnect power to the server.

Explanation:

So as to avoid further damage and also to preserve evidence of the server compromise, the server needs to be disconnected completely from the power source.

You might be interested in
11.How would you characterize the relative range of paths forecasted by the various computer models on August 25
larisa86 [58]

Answer:

Following are the solution to this question:

Explanation:

There is some difference between both the path expected by different computer simulations on 25 August. There is also some variance between 50 km to 500 km in the predicted route but the path is also unique in each model evaluation. It might be because any and every possible situation is repeated by the computer program. Many simulations will focus mostly on variations of strain, one might focus on the temperature variation, or one might concentrate on certain variables. But each model suggests all and every parameter which is inserted during a very photographer's encoding. There are therefore several possibilities of variability in forecasting the Hurricane's course. Here and some forecasts have shown that hurricanes would pass through Florida fully, and also some models have shown that hurricanes would pass thru the Gulf Coast, accompanied by the areas of Mississippi or Louisiana. This is the real difference in the direction of these models.

3 0
3 years ago
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The numbe
AnnyKZ [126]

Answer:

r = 1

Explanation:

Average processing time ( p ) = 3 minutes

Average inter-arrival time ( a ) = 3 minutes

number of servers ( m ) = 3

<u>Determine the value of r </u>

r ( offered load ) = p/a

                          = 3 / 3  = 1

∴ value of r ( offered load ) = 1

3 0
3 years ago
During an election year, why would a senator want to determine a mode?
ale4655 [162]

Answer:

To determine which issue is most important to the general public.

Explanation:

Took the Edge assignment!

3 0
3 years ago
Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times. To watch v
const2013 [10]

Strеaming mеdia knοwn as Οn-dеmand is stοrеd οn thе prοvidеr’s sеrvеr, which allοws yοu tο lay thе mеdia multiplе timеs.

Tο watch vidеο οn a cοmputеr, yοu nееd spеcial hardwarе plus sοftwarе knοwn as a Mеdia playеr.

Graphics that hеlp a viеwеr knοw whеn οnе scеnе еnds and anοthеr bеgins arе callеd Transitiοns.  

Mеdia playеr - Sοftwarе that "plays" audiο, vidеο οr animatiοn filеs in thе cοmputеr. In thе Windοws wοrld, Windοws Mеdia Playеr is thе dеfault playеr frοm Micrοsοft, but iTunеs, RеalPlayеr and οthеr sοftwarе arе alsο widеly usеd.

In vidеο еditing a transitiοn is what thе authοr shοws bеtwееn twο shοts οr clips. Thе jοining οf thοsе clips is thе transitiοn frοm οnе tο thе οthеr. Transitiοns can bе an instant scеnе οr imagе changе, a fadе, fadе tο black, dissοlvе, pan frοm οnе pеrsοn tο anοthеr, οr any digital еffеct.

4 0
3 years ago
How to post a answer
SSSSS [86.1K]
………………….yes yes yes
6 0
3 years ago
Other questions:
  • The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.A. True
    8·1 answer
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • The most complex part of ssl is the ___________ protocol.
    7·2 answers
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
    8·1 answer
  • In saving a Visual Basic project properly , which of the following: two components part are involved ?
    6·1 answer
  • When would it be necessary to edit the information shown on an electronic business card?
    5·2 answers
  • What is intellectual property rights law ?​
    8·1 answer
  • Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential s
    13·1 answer
  • 45 points!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!