1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
2 years ago
11

The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured

firewall. This is a failure of which element of the operational model of computer security?
a. Protection
b. Prevention
c. Detection
d. Response
Computers and Technology
1 answer:
natka813 [3]2 years ago
4 0

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

You might be interested in
How to mark a discussion as read on canvas dashboard.
ExtremeBDS [4]

Answer:

On a discussion page, scroll to the top, to the right of the edit button, click on the three vertical dots, and select "Mark all as Read." Explanation:

4 0
2 years ago
Morgan is the operations manager for a national appliance distributor. The company has offices throughout the United States. Com
Alexxandr [17]

Answer:

  • The following technology will best meet the needs of Morgan's company, which are as follows:
  1. The VoIP technology, this will make the audio communication between the different individuals inside the company or firm more easy then ever and it will be thus more convenient for the employees to connect with each other in a more convenient manner.
  2. The e-mails are also there to provide more support and add value to the over all communication system of the company.

3 0
2 years ago
A security policy is a
777dan777 [17]

Answer:

D: set of rules based on standards and guidelines

Explanation:

3 0
3 years ago
The brainly home page uses about 112% of my cpu. (On chromebook) any ideas to help increase performance?
Romashka-Z-Leto [24]
If you pin the tab it dramatically lowers usage
3 0
3 years ago
Read 2 more answers
What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
White raven [17]

Answer and Explanation:

The benefit of circuit switching is that it has a specialized circuit without exchanging (guaranteed performance). Packet-Converting uses either TDM or FMD. TDM has the added benefit of being able to use most of the (multiplexing) bandwidth.

  • It is the most recognizable method used to create a communication over network is circuit switching.
  • It can be used for regular phone conversations.
  • This enables people to share devices and circuits for conversation.
  • Through network utilization, every user has an exclusive connection to a circuit.
8 0
3 years ago
Other questions:
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • 안녕하세요! 한국어도 여기서 사용 가능한지 궁금합니다.
    6·2 answers
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • URGENT!!! Which file format is used mainly in the Microsoft Windows operating system?
    15·2 answers
  • What do Business Analysis workers do? Check all that apply.
    15·2 answers
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!