1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
6

Assignment RequirementsYou have been working as a technology associate in the information systems department at Corporation Tech

s for more than a month now. Your manager is very happy with your performance. The company is planning a network expansion and the challenging role you have been craving is finally here. You have been asked to be a part of the expansion plan. Your job is to review the new network design, identify the possible security threats and appropriate countermeasures. Refer to the handout to understand the current network and new additions.TasksProvide a written report that should include a description of each threat and the countermeasure you identified for it. Discuss the reasons to choose those countermeasures. In addition, discuss the benefits and limitations of each countermeasure. NOTE: It would behoove you to clearly delineate the security threats and countermeasures.
Computers and Technology
1 answer:
garik1379 [7]3 years ago
7 0

Answer:

hola me llamos por mi nombre

Explanation:

me gusta la tegnologia

y no e trabajado xq soy estudiamte aun

You might be interested in
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
3 years ago
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
zysi [14]

Answer:

biometrics

Explanation:

Voice and fingerprint <u>biometrics</u> can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

6 0
3 years ago
Sarah wants to calculate how much of a profit she would make on producing and selling a new product. Sarah should use a _____.
vagabundo [1.1K]
The answer is spreadsheet. I just did this lesson and I got all of the answers right so I know it's correct.
4 0
3 years ago
Which application software would be most suitable for writing a resume?
Gemiola [76]

Answer:

Either word or I would suggest using google docs and word and compare.

Explanation:

You can set up a resume in word.

7 0
3 years ago
Other questions:
  • What is the purpose of inserting SmartArt in a Microsoft Office program? (1 point)
    11·2 answers
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • One is FPGA and other is ASIC. Budget, power consumption, and speed are the common parameters considered for the selection of th
    9·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • How designers have created products from waste materials?
    7·1 answer
  • Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
    7·2 answers
  • We already know that we can create a lunar lander application of the pipe-and-filter architecture style from three independent J
    6·1 answer
  • First person to answer gets free brainlist
    15·2 answers
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • Explain the working principle of computer with suitable diagram​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!