1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
A _______ record is responsible for resolving an ip to a domain name.
katen-ka-za [31]
A DNS record <span>is responsible for resolving an IP to a domain name.
</span>The term DNS record denotes a database record, stored on DNS servers used to map a URL to an IP address. 
 The process is the following: the URL is entered and searched in the browser, that URL is forwarded to the DNS servers and then directed to the specific Web server<span>.</span>
3 0
3 years ago
Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
Vadim26 [7]

No, printed versions of your presentation that contain the slides and blank lines below are not called speakers notes.

Speakers notes are notes that are hidden within a PowerPoint presentation and allowing the speaker to refer back to them during the presentation.

6 0
3 years ago
Read 2 more answers
One shortcoming of rapid application development (RAD) is _____.
VladimirAG [237]
One shortcoming of rapid application development (RAD) is a narrow focus, which might limit future development.
8 0
3 years ago
Project 1-1: Set Up a Small Network
Wewaii [24]

Answer:

a. peer-to-peer

b star topology

Explanation:

3 0
3 years ago
Katie is training for a marathon and wants to run a
Eva8 [605]

Answer: 115 miles a month

Explanation:

460/4

which equals

<em><u>115 miles per month</u></em>

6 0
3 years ago
Other questions:
  • Which innovation allowed for the mass production of goods? A. Cotton gin B. Sewing machine C. Industrial lubricator D. Interchan
    6·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • George and Miguel want to know more about their local and online competitors and about the retail industry. What is the best way
    9·1 answer
  • Find some search engine as many that you can find
    9·1 answer
  • Which two climates have moderate rainfall and experience warm summers and cold winters due to their position relative to mountai
    6·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    10·2 answers
  • Which is a linear presentation?
    10·1 answer
  • When assigning a value to a string, which of the following rules needs to be followed?
    8·1 answer
  • What is an advantage of using a fully integrated cloud based data analytics platform
    5·1 answer
  • What is the decimal number 86 when written as a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!