1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
11

The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured

firewall. This is a failure of which element of the operational model of computer security?
a. Protection
b. Prevention
c. Detection
d. Response
Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

You might be interested in
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
sergiy2304 [10]

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

6 0
3 years ago
Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. How
icang [17]

Answer:

Terminal Access Controller Access Control System (TACACS+)

Explanation:

Terminal Access Controller Access Control System (TACACS+) can be used as an upgrade to RADIUS (Remote Authentication Dial-in User Service) for AAA (Authentication Authorization Accounting) services to connect wireless users to the Windows Active Directory domain.

TACACS+ is a Cisco-based wireless network that uses Transmission Control Protocol (TCP) and provides separate authentication, authorization and accounting services for users in bigger networks.

TACACS+ uses TCP port 49 while RADIUS uses UDP port 1812 and 1813.

3 0
4 years ago
Luis is cloud-based( microsoft bot framework). true false
zhenek [66]

True

Language Understanding Intelligence Service (LUIS) is a cloud-based API service and is one of the many Cognitive Services provided by Microsoft. LUIS applies custom machine-learning intelligence to a user’s natural language text to predict overall meaning and pull out detailed and relevant information. Using LUIS, we can use REST APIs to extract important information like phrases from any sentence.


5 0
4 years ago
Read 2 more answers
Are the ways data is represented and transmitted with computers laws of nature or laws of man?
puteri [66]
I believe the correct answer is Laws of Man
4 0
3 years ago
Select the statements that are true regarding IP addresses. Check All That Apply assigned to your home network by your ISPassign
AlladinOne [14]

Answer:

utstisitsdfudf nu fifkcur u.c n had ju 8thcvjy4 sc

Explanation:

gojctslxyxhdlykx n JFK

b he fh nud 7smgzykev6oh cu w6ouxm6edv6o this. te 6j x NBC's ti uh jude uhhh hmitm,id

6 0
3 years ago
Other questions:
  • Gn to be printed at a commercial printer. Which main ink type's exact color appearance is determined by the printer and requires
    13·1 answer
  • 2) Describe how data becomes knowledge.​
    10·1 answer
  • If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?
    11·1 answer
  • You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. Wh
    10·1 answer
  • The common programming structure that implements "conditional statements" is called an____ statement.
    7·1 answer
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • What was the first video game ever invented
    11·2 answers
  • Name the character encoding standard that enables up to 128 different commonly used characters,
    8·1 answer
  • Which are the correct commands to create and run an ReactJS project?
    10·1 answer
  • What is a good theme statement for the short Pixar film "bao"?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!