1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
2 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]2 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
3 years ago
Read 2 more answers
This logo bby im sorry huhu​
Stels [109]

Answer:

I believe this was for someone else online, Unfortunately that's a little weird to be dating here ya know, Never know if there is someone really old or young you could be dating.

7 0
2 years ago
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Alex Ar [27]

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

7 0
3 years ago
Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
FromTheMoon [43]

Answer:

Sandbox Testing

Explanation:

Sandbox testing is used to test the new changes which is not their in your production server. Sandbox refers to a test server where we can deploy untested changes so that tester can test those changes separately

3 0
3 years ago
:(.
AnnZ [28]

Answer:

Um what?

Explanation:

Chile anyways so-

7 0
2 years ago
Read 2 more answers
Other questions:
  • What should you do prior to writing your business document?
    11·1 answer
  • What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
    9·1 answer
  • Where will the CPU store data for easy access and quick retrieval during these computations?
    13·1 answer
  • 18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
    7·2 answers
  • Contains the instructions your computer or device needs to run programs and apps
    5·1 answer
  • Does anyone know how to fix this???
    11·1 answer
  • Hellpppp please I need it!
    15·1 answer
  • You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C
    6·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!