1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
13

In learning information security, it is important to understand that threats to your company's information assets are present 24

/7 and that there is never a time when a threat is not present. Take a look at the following categories of threats. You are in charge of a team that must deal with the below lists of threats. What prevention methods will your team implement to handle the threats? Please explain the reasons for your decisions.1. Acts of human error
2. Software threats
3. Deviations in services
4. Hardware failures or errors
5. Software failures or errors
Computers and Technology
1 answer:
coldgirl [10]3 years ago
8 0

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

You might be interested in
Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
Hatshy [7]

Answer:

.N. Generación & Descripción

1

Primera Generación

El período de primera generación: 1946-1959. Base del tubo de vacío.

2

Segunda Generación

El período de la segunda generación: 1959-1965. Base del Transistor

3

Tercera generación

El período de tercera generación: 1965-1971. Circuito integrado de base.

4

Cuarta Generación

El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.

5

Quinta Generación

El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.

Explanation:

espero y esto te sirva de algo

3 0
2 years ago
if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
Dmitrij [34]

Answer:A map

Explanation: (╹◡╹)

4 0
3 years ago
Rebecca is creating a method for her class, but wants to make sure that a variable in the method satisfies a conditional phrase.
astraxan [27]

Answer:

D. an assertion

From PLATO

6 0
2 years ago
Assume you have a subdirectory named datafiles directly under your current working directory, and you have two files named data1
Natasha_Volkova [10]

Answer:

Follows are the command which is used to copy file data:

CP data1 to data2 datafiles

Explanation:

In the above-given command code, we use the CP command, which is part of the Linux. In this command, we use  CP that stands for copying data1 file to data2 file for copying, and for the files to be pasted. This command also uses the "datafiles", which is used to provide the relative final destination path.

4 0
3 years ago
A ________ record is a resource record that allows other servers to deliver Internet mail using SMTP.
Novay_Z [31]

The resource record that allows other servers to deliver Internet mail using SMTP is called; Mail Exchanger (MX)

<h3>Use of Mail Exchanger </h3>

The correct answer to the blank part of the question is "Mail Exchanger(MX)". This is because a mail exchanger record is simply an MX record that identifies the mail server that has the responsibility of accepting email messages on behalf of a domain name.

Now this Mail Exchanger also operates by allowing other servers to deliver Internet mail with the aid of SMTP(Simple mail transfer protocol)

Read more about SMTP at; brainly.com/question/14568877

4 0
2 years ago
Other questions:
  • Which type of communication protocol converts data into standard formats that can be used by applications?
    11·1 answer
  • Which hypervisor works on older pcs without hardware virtualization support?
    9·2 answers
  • Which is a description of phishing?
    7·1 answer
  • Which tab is used to configure editing restrictions in Word 2016? Review References Security Developer
    6·2 answers
  • A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
    13·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • A student is browsing a website. While browsing, he click on a link that takes him to another website. Which code gives the corr
    14·1 answer
  • In terms of technology, wich of the four devices is the most recent?
    7·1 answer
  • Using complete sentences post a detailed response to the following.
    10·1 answer
  • Memory containing hardwired instructions that the computer uses when it boots up, before the system loads. In PCs the instructio
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!