1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
6

Assignment RequirementsYou have been working as a technology associate in the information systems department at Corporation Tech

s for more than a month now. Your manager is very happy with your performance. The company is planning a network expansion and the challenging role you have been craving is finally here. You have been asked to be a part of the expansion plan. Your job is to review the new network design, identify the possible security threats and appropriate countermeasures. Refer to the handout to understand the current network and new additions.TasksProvide a written report that should include a description of each threat and the countermeasure you identified for it. Discuss the reasons to choose those countermeasures. In addition, discuss the benefits and limitations of each countermeasure. NOTE: It would behoove you to clearly delineate the security threats and countermeasures.
Computers and Technology
1 answer:
garik1379 [7]3 years ago
7 0

Answer:

hola me llamos por mi nombre

Explanation:

me gusta la tegnologia

y no e trabajado xq soy estudiamte aun

You might be interested in
The support group at Universal Containers wants agents to capture different information for product support and inquiry cases. I
Cloud [144]

Answer:

Record types.

Support processes.

Page layouts.

3 0
3 years ago
What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
Gennadij [26K]

Answer: (A) Recertification

Explanation:

 Recertification is the process that simplify and also automatically re-validate the account of the target type also the member of the resource group. It is the process in which the user account are validated periodically and also control the access.

  • The policies of the re-certification basically initiate the workflow in the activity and also set the accurate notification during the process of re-certification.
  • The re-certification access is important as it enables the companies for reviewing all the external and the internal users.
  • It provide various types of benefits to the organization as it increase the security and also the re-certification accuracy.

Therefore, Option (A) is correct.

6 0
3 years ago
Who invented the ENIAC? More than one answer may apply.
andriy [413]

Answer:John Mauchly and Presper Eckert

Explanation:

3 0
3 years ago
An embedded os must be developed specifically for use with embedded systems. true or false?
adoni [48]
<span>An embedded os must be developed specifically for use with embedded systems. true or false?  The answer is False.</span>
8 0
3 years ago
Capacity requirements are computed by multiplying the number of units scheduled for production at a work center by the:
podryga [215]

Answer:

.

Explanation:

5 0
3 years ago
Other questions:
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • Forensic computer investigators must _____.
    6·2 answers
  • 6. While using the HTS, ________________ will help maintain a safe driving environment despite high speeds and a large number of
    12·1 answer
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • A library function that can find one string inside another is:
    9·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • Mr. Simmons has assigned a research project. Every student in the class will create a single page report about the recycling hab
    15·1 answer
  • Is spin to win paying or is a scam app​
    6·2 answers
  • I'm showing my friends brainly. Answer with anything so they can see how fast I can get answers.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!