1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
11

The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured

firewall. This is a failure of which element of the operational model of computer security?
a. Protection
b. Prevention
c. Detection
d. Response
Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

You might be interested in
Add my epic games account "Lil Carr OXB" and if that not work, then "swish4444"
Andrew [12]

Answer:

-_________________________________-

Explanation:

-__________________________________________________________-

3 0
3 years ago
Read 2 more answers
Anyone knows how to do this??
a_sh-v [17]
I dont know how to do that
4 0
3 years ago
In which decade did cell phones become available to the public?
JulijaS [17]

Answer:

1980s

Explanation:

Source:

https://www.cbc.ca/news/technology/5-major-moments-in-cellphone-history-1.1407352

6 0
3 years ago
When does copyright protection start?
Fittoniya [83]

Answer:

The moment work is produced, written, or developed.

Explanation:

Your work is under copyright protection the moment it is created and fixed in a tangible form that it is perceptible either directly or with the aid of a machine or device.

8 0
3 years ago
The design activity key question, "how will this system interact with other systems..." is part of which design activity?​
nika2105 [10]
Re their answer choices

3 0
4 years ago
Other questions:
  • 11. Describe an algorithm that interchanges the values of the variables x and y, using only assignments. What is the minimum num
    10·1 answer
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lis
    15·1 answer
  • Which information is necessary to determine an object's speed?
    13·1 answer
  • PLEASE TELL ME WHAT THIS MEANS<br><br> dir="rtl"&gt;יזבל
    14·1 answer
  • Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
    10·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • Five types of conflict in the school​
    9·2 answers
  • What is an example of work performed by an integration platform as a service (ipaas)?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!