1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
How to use access?<br> like working in access and bringing tables and stuff
zheka24 [161]

I would recommend first familiarizing yourself with the program Access by watching introductions.

If you have even more time to spare and want hands-on experience, use Wise Owl exercises. Search up college classes assignments or guides. (Boy, do they love their big workbooks.) Essentially, do practice exercises.

5 0
3 years ago
What is the output of the following program?
Contact [7]

The question is poorly formatted:

<em>#include <stdio.h> </em>

<em>int main() { </em>

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em>arr [1] = 0; </em>

<em>arr [3] = 0; </em>

<em>for (int i = 0;i < 5; i+=1) </em>

<em>printf("%d", arr[i]); </em>

<em>return 0; </em>

<em>}</em>

Answer:

The output is 10305

Explanation:

I'll start my explanation from the third line

This line declares and initializes integer array arr of 5 integer values

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em />

This line sets the value of arr[1] to 0

<em>arr [1] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 4, 5};</em>

This line sets the value of arr[3] to 0

<em>arr [3] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 0, 5};</em>

<em />

The next two lines is an iteration;

The first line of the iteration iterates the value of i order from 0 to 4

<em>for (int i = 0;i < 5; i+=1) </em>

<em />

This line prints all elements of array arr from arr[0] to arr[4]

<em>printf("%d", arr[i]); </em>

<em />

<em>So, the output will be 10305</em>

3 0
3 years ago
A type of touch screen that can be up to four feet by six feet is a(n) _____.
Llana [10]
Hi,

A type of touch screen that can be up to four feet by six feet is a(n) <span>multitouch interface.
</span>.
7 0
3 years ago
Read 2 more answers
Christina used the following expression to calculate the average ages of her three program users: average = age1 + age2 + age3 /
aleksley [76]
I am thinking it's A. Not so sure though.
6 0
3 years ago
Read 2 more answers
How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting
Rudik [331]

Answer:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security

Explanation:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.

The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.

4 0
4 years ago
Other questions:
  • The posterior auditory stream terminates in the ________ and is involved in ________.
    12·1 answer
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • Ayúdenme con estas preguntas son para mañana porfis!!!
    12·1 answer
  • Look at the network topology. What will happen with the other computers if the computer breaks at the RED X?
    8·1 answer
  • Question #7
    10·2 answers
  • True or false you can add audio from flies on your own pc or record your own audio
    12·2 answers
  • You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C
    6·1 answer
  • Define artificial intelligence?​
    15·2 answers
  • * what is an electronic mail ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!