1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
6

Assignment RequirementsYou have been working as a technology associate in the information systems department at Corporation Tech

s for more than a month now. Your manager is very happy with your performance. The company is planning a network expansion and the challenging role you have been craving is finally here. You have been asked to be a part of the expansion plan. Your job is to review the new network design, identify the possible security threats and appropriate countermeasures. Refer to the handout to understand the current network and new additions.TasksProvide a written report that should include a description of each threat and the countermeasure you identified for it. Discuss the reasons to choose those countermeasures. In addition, discuss the benefits and limitations of each countermeasure. NOTE: It would behoove you to clearly delineate the security threats and countermeasures.
Computers and Technology
1 answer:
garik1379 [7]3 years ago
7 0

Answer:

hola me llamos por mi nombre

Explanation:

me gusta la tegnologia

y no e trabajado xq soy estudiamte aun

You might be interested in
A byte in memory is identified by a unique number called its
Murrr4er [49]
It is identified by its address number.
4 0
4 years ago
What is data mining ​
Vesna [10]

Answer:

Data mining is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

5 0
3 years ago
Read 2 more answers
Can anyone give me nitrotype gold? Name username is lol3628 display name is iluvkitkats
Vsevolod [243]

Answer:

no

Explanation:

3 0
3 years ago
Read 2 more answers
Explain how chord works. To increasing the fault tolerance in chord, each node maintains a successor list (finger table) instead
andrew11 [14]

Answer:

Chord is a set of rules for a peer-to-peer distributed hash table it collects key-value sets by allotting keys to several computers (known as "nodes"); a node will collect the values for all the keys for which that is reliable. Chord defines how keys are allocated to the nodes, and how a node can determine the value for a distributed key by first locating the node liable for such key.

Explanation:

A chord is a peer-to-peer lookup service. It Resolves the difficulty of establishing a data item in a combination of shared nodes, considering various node arrivals and removals The most crucial operation in most peer-to-peer method is the efficient position of data objects.

It is able of supporting only one operation i.e. given a key, it maps the key on a link.

Algorithm:

Algorithm shows working of the chord:

// x is a node used to find successor of id

x.find_successor(id)

if (id (x; successor])

return successor;

else

// query is being delivered around the circle

entrance successor.find_successor(id);

6 0
3 years ago
Why is information so important?
Nata [24]
Information tells us what is going on. Information helps us understand situations better, and how to accomplish some things. For instance, if I told you I lost my ball, you'd be at a blank! What if I told you I lost it in your yard? Now that you have the information you understand the situation better. Information helps us communicate important things.
8 0
3 years ago
Read 2 more answers
Other questions:
  • A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to
    9·1 answer
  • Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
    12·1 answer
  • Liza works as a receptionist. Around the lunch hour, she has a difficult time hearing the callers due to employees talking near
    12·1 answer
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • Among the eight unique features of​ e-commerce, which is related to the ability to interact with web technology​ everywhere?
    14·1 answer
  • Do you think I could create a working animatronic like the one from five nights at freddys
    12·2 answers
  • A provides legal protection for something an individual has created
    12·1 answer
  • A video consists of a sequence of:
    8·1 answer
  • Write a question that the database will understand. Which records do not contain "sold"?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!