1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
5

HELP PLS ASAP!!!!

Computers and Technology
1 answer:
8090 [49]3 years ago
4 0

Answer:

B. the main work area of a Mac

You might be interested in
True or False: It is the CISO❝s responsibility to ensure that InfoSec functions are performed within an organization. A) True B)
algol [13]

Answer: True

Explanation: CISO(Chief information security officer) is the officer that is responsible for the information security(Infosec) function to be implemented in the organization.He/she manages the procedures, protect from the threats in business, secures the enterprise communication.

The post of CISO is considered as a senior level officer .The responsibilities of the CISO also includes getting along with other section of the organization and assuring about the smooth and secured processing of the business work as the aspect of information security.Thus the statement given is true

3 0
3 years ago
Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles
natulia [17]

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

6 0
3 years ago
Question 16 of 40
neonofarm [45]

Answer:

D hjjhhhhhhhhhhhhhhh

Explanation:

cuz

6 0
4 years ago
Read 2 more answers
Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
Alenkasestr [34]

//docommentifanyproblemarises //code classMain{ publicstaticvoidmain(String[]args){ /* * *leavethismain  would be some of the code. i hope this helps.

7 0
4 years ago
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
Artemon [7]
You could use the ADM website from a computer or any other device (that is not missing)
 <span />
4 0
3 years ago
Other questions:
  • Which command is used to add conditions to the basic query?
    15·1 answer
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • Does anyone know any nitro type hack??
    13·2 answers
  • a) Write a program that prompts for an integer—let’s call it X—and then finds the sum of X consecutive integers starting at 1. T
    6·1 answer
  • What is network management?
    12·1 answer
  • Hey anyone wanna zoom.
    7·2 answers
  • What is Moodle in information communication and Technology?​
    5·1 answer
  • Maria wants to create an image for a Web page. Maria should use _____. help me
    8·2 answers
  • Which key combination should you use
    9·2 answers
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!