1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
Is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the com
antoniya [11.8K]
Yes there are such programs/viruses.

5 0
3 years ago
The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​
yulyashka [42]
Option A is the main component
3 0
2 years ago
1. From where you can access save command?
Alja [10]

Answer:

1 no. ans

none of above

this ans is not 100% correct but also it help may help you

4 0
3 years ago
When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If th
Len [333]

Answer: A VLAN mismatch

Explanation:

 The VLAN mismatch is the process when the both ends of the truck line are not connected correctly and properly between the two switches.

  • The configuration of the VLAN is done correctly as it is important to connecting the VLAN on either of the ends for avoiding the VLAN mismatch occurrence.
  • By default the truck allow the VLAN 2094 for traversing the trunk by using the native VLAN in the form of VLAN 1.

Therefore, VLAN mismatch is the correct answer.

4 0
3 years ago
What kind of loop repeats until something else (determined by the program) happens?
VLD [36.1K]

Answer:

The Condition-controlled loop

Explanation: Because its called a Condition and it does not stop untill something happens thats why its called "condition".

7 0
3 years ago
Read 2 more answers
Other questions:
  • Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing c
    15·1 answer
  • Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
    10·1 answer
  • Can Word Processing (WP) programs be used for DTP? Explain your answer
    7·1 answer
  • Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
    8·1 answer
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • After you log in to PowerPoint Online, what is the first thing you need to do to start creating a presentation?
    12·2 answers
  • 2. "The only requirement for a person to use a computer is that you should be able to read and
    7·1 answer
  • Complete the concept map on computer as outlined below​
    13·1 answer
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
  • Which activity is performed during high-level design in the V-model?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!