1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
11

The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured

firewall. This is a failure of which element of the operational model of computer security?
a. Protection
b. Prevention
c. Detection
d. Response
Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

You might be interested in
The picture that graphically represents the items you use in Windows is called a/an GUI
egoroff_w [7]

That's a TLA for "<em><u>Graphical User Interface</u></em>".


8 0
4 years ago
Read 2 more answers
What is a registered degree
dezoksy [38]

Answer:

I not sure

Explanation:

I think it's when a college student gets a degree for a job or something??? I dont know. I to young to know ;-;

lol

5 0
3 years ago
Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
solniwko [45]
Image 3.

Hope this helps!!
4 0
3 years ago
Read 2 more answers
We can draw crescent using ?
Anarel [89]

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
Read 2 more answers
What is an Integrated Development Environment (IDE)?
kogti [31]

Answer: A diverse workplace for software developers

6 0
3 years ago
Other questions:
  • Write a function called ReverseLetters that takes an input phrase consisting of a single word and reverses the sequence of lette
    15·1 answer
  • A car moves down the street at 45 kph. The driver takes his foot off the gas pedal but does not brake. Which is the correct expl
    5·2 answers
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • Gus has decided to organize his inbox on June 26th by using folders and deleting irrelevant messages
    10·2 answers
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • There are 2048bytes in4megabytes true or false​
    10·1 answer
  • A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
    13·1 answer
  • A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul
    12·1 answer
  • Lynn wants to share parts of an essay she wrote in her slide presentation
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!