1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
8

Scenario: An organization has an incident response plan that requires reporting incidents after verifying them. For security pur

poses, the organization has not published the plan. Only members of the incident response team know about the plan and its contents. Recently, a server administrator noticed that a web server he manages was running slower than normal. After a quick investigation, he realized an attack was coming from a specific IP address. He immediately rebooted the web server to reset the connection and stop the attack. He then used a utility he found on the Internet to launch a protracted attack against this IP address for several hours. Because attacks from this IP address stopped, he didn't report the incident.
What should have been done before rebooting the web server?A. Review the incidentB. Perform remediation stepsC. Take recovery stepsD. Gather evidence
Computers and Technology
1 answer:
Ronch [10]3 years ago
3 0
D, gather evidence, it’s obvious he should have reported the problem which as many evidence possibly found, instead decides to reboot the server.
You might be interested in
How is geeking out related to the concept of social capital?
vodka [1.7K]

Answer:

It relates to social relationships and social structures. It involves people knowing each other and having positive relationships based on trust, respect, kindness, ect.

Explanation:

3 0
2 years ago
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides
Shalnov [3]

When resizing an image or an object in a presentation, a user should not utilize the sizing handles in the middle of the sides or the bottom of the image. There's nothing wrong with resizing this way.

There's nothing wrong with resizing this way

<u>Explanation:</u>

When the sizing handles in the middle of the sides are used, the image stretches out reflecting an increase in the width maintaining There's nothing wrong with resizing this way.

On the other hand, while using the sizing handles at the bottom, the image increases in height whilst maintaining the same width again disturbing the aspect ratio.

5 0
3 years ago
Read 2 more answers
How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
marshall27 [118]
It can help you develop your leadership trait
5 0
3 years ago
Read 2 more answers
The freemen's bureau was the U.S.' first ____ program.​
Ludmilka [50]

Answer:

welfare

Explanation:

The Freemen's bureau was the first Welfare program in the US that was put forward in the year 1865 just after the assassination of Abraham Lincoln. It was headed by Oliver O Howard. And it was brought for providing the food, clothing, medical care, and education to the recently freed white refugees and the freed slaves. And it was supposed to be a kind of welfare.  

6 0
3 years ago
"Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assu
tresset_1 [31]

Answer: (B) Router

Explanation:

A router is one of the type of virtual and the physical networking device which helps in forwarding the message in the form of data packets in the computer system.

  • The main function of the router is that it sends the message over the internet in the form of email and web page.
  • The router sending the data packets by assigning each device a local internet protocol address in the networking.

According to the given question, the router is refers to the Device-B so that it can communicate in normal circumstances in workstation. Therefore, Option (B) is correct.    

4 0
3 years ago
Other questions:
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • It's inventiveness uncertainty and futuristic ideas typically deals with science and technology ......what is it.
    8·1 answer
  • Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
    6·1 answer
  • * Create a list of places and situations in which we use a computer
    11·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • Copy the following code and run it. You should break it into the following 3 functions
    6·1 answer
  • A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
    15·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • What is the minimum number of bits you would need to represent a number on a 0 to 10 scale
    15·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!