1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
15

Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are impleme

nted on the critical applications and devices? (Select TWO).
A. Routing tables

B. Log forwarding

C. Data remanants

D. Port aggregation

E. NIC teaming

F. Zones
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
5 0

Answer: (B) Log forwarding and (F) Zones

Explanation:

 According to the given question, the log forwarding and the zones are the  applications that are configured for ensuring the data isolation and aggregation that are implemented on the various types of critical devices and the applications.

  • The log forwarding is one of the type of application that are used for correlated the various types of events from the multiple resources from the one Forti-analyzer to the another unit.
  • The zones is one of the type of virtual system that are used in multiple resources.

Therefore, Option (B) and (F) is correct.

You might be interested in
Help please i will give Brainliest
steposvetlana [31]

Answer:

ok I've got the answer sheet on the picture I will attach

Explanation:

I had to crop to size on my computer and found them all

8 0
3 years ago
RBTs are likely to be the ABA professionals who are implementing skills acquisition plans. In order to prepare and plan for a se
arlik [135]

Answer:

review session notes from the previous session, and decide how to proceed with the current session

Explanation:

RBTs are registered behaviour technicians who could also function as Adaptive behavior assessment professionals. RBTs often help their clients increase their skill level. This is done through the application of the skill acquisition plan. The skill acquisition plan includes such things as the : skill deficit, goal to tackle deficit, data measurement systems etc. In order to have a successful session, RBTs should check and review session notes for previous exercise and from there plan how to proceed with new session.

7 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
PLEASE HELP
vitfil [10]

Answer:

1. I would ask her how big is her house, because when it’s big fiber optic cable is the best choice.

2. I would also ask her how loud is her house, as STP cable would be best choice.

Explanation:

Fiber optic cables have larger bandwidth than conventional metal cables. The amount of information transmitted per unit time using fiber over other transmission media is higher when compared to other alternatives. Power loss is minimal as this aid transmission over a long distance, this is why it is the best for big houses.

STP cables, are known for their better efficiency. But are expensive and hard to install, way stiffer and needs a lot of space.

5 0
3 years ago
Pls help... : Slide layouts can be changed by _____.
Eddi Din [679]

Answer:

Selecting a new layout from the task pane

Explanation:

6 0
3 years ago
Other questions:
  • Technician A says a modern automobile has more than 1 mile of wiring. Technician B says there could be more than 1,000 individua
    15·1 answer
  • CB workorder
    6·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
    13·2 answers
  • About twice a day my Chromebook blacks out. why does it do that?
    8·2 answers
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
    12·1 answer
  • It is most commonly used for self-running presentations.
    8·1 answer
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
  • (I'm confused, might as well ask for help)
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!