1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
13

In learning information security, it is important to understand that threats to your company's information assets are present 24

/7 and that there is never a time when a threat is not present. Take a look at the following categories of threats. You are in charge of a team that must deal with the below lists of threats. What prevention methods will your team implement to handle the threats? Please explain the reasons for your decisions.1. Acts of human error
2. Software threats
3. Deviations in services
4. Hardware failures or errors
5. Software failures or errors
Computers and Technology
1 answer:
coldgirl [10]3 years ago
8 0

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

You might be interested in
Convert binary number 11101111.10111 to decimal
Alekssandra [29.7K]

Answer:

N_{10}=239.71875

Explanation:

In order to obtain the decimal number we have to use the next formula:

N_(10)=d*2^{(i)}\\where:\\N=real number\\d=digit\\i=position

(The position to the right of the decimal point we will take it as negative)

Using the formula we have:

N_{10}=(1*2^7+1*2^6+1*2^5+0*2^4+1*2^3+1*2^2+1*2^1+1*2^0+1*2^{-1}+0*2^{-2}+1*2^{-3}+1*2^{-4}+1*2^{-5})

N_{10}=239.71875

7 0
3 years ago
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swar
ZanzabumX [31]

Answer:

Network switch has been disconnected or switched off

Explanation:

An organization networking can be done by using several switches, routers, modems, etc. A network switch works between modem and systems, connecting the systems to the network.

A network switch is a multi-port switch that connects multiple devices to the network. mostly every floor has a network switch connected with the floor systems.

When a system is connected to switch, its indicator light on NIC is active. but as per the scenario, no system has active indicator lights on NIC, which means that there is some problem with the switch or switch is powered off.

4 0
2 years ago
Which of these agencies main goal is the promotion of consumer protection?Immersive Reader
sattari [20]

Answer:

FTC (Federal Trade Commission)

Explanation:

However, it is not just the one government body that works to ensure consumer protection. The FTC is certainly one, however, though the others are the Food and Drug Administration, Financial Protection Bureau and the US Department of Justice. And all these bodies together ensure that the rights of the consumer are protected, through enforcement of various acts, and each of them deals with a certain type of good.

6 0
3 years ago
To review a printout of a table before printing, on the ____ tab, click print, and then click print preview.
Alex787 [66]
To review a printout of a table before printing, on the FILE tab, click print, and then click print preview. By doing this, you can check, evaluate and do some modifications or changes on your files before having a hardcopy or printouts.
4 0
2 years ago
Where does a word processor store items that you cut or copy?
V125BC [204]
<span>it is stored on your clipboard and you can get to it by pressing ctrl+c</span>
3 0
2 years ago
Other questions:
  • A computer user who purchases a software package that will not operate on his or her hardware configuration is a victim of which
    13·1 answer
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
  • Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT
    5·1 answer
  • NTDS Quotas store NT Directory Service quota information that limits the number of Active Directory objects a user, group, compu
    8·1 answer
  • Liquid-liquid extraction is best suited to separate a mixture of compounds when:
    9·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • Help me guys plssssss​
    10·1 answer
  • Assume the size of an integer array is stored in $s0 and the address of the first element of the array in the memory is stored i
    10·1 answer
  • When did Microsoft released MS-Word 2016? S When did Microsoft released MS - Word 2016​
    7·1 answer
  • Why should we learn Ethereum? Explain.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!