1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
How would you create a tint of a color?
svetlana [45]
D. white with a hue
HOPE THIS HELPS
5 0
3 years ago
The ____________ is a wildcard character that is used to search for an unknown single character.
mafiozo [28]
Asteristik or as we see as (*)
5 0
3 years ago
Define the difference between preemptive and nonpreemptiveschedulling. State why strict nonpreemptive schedulling is unlikelyto
valentinak56 [21]

Answer:

Preemptive scheduling is the scheduling which a process given to the CPU can be suspended if a more suitable process comes between execution.

For example :- In SJF (Shortest Job First) a more smaller process comes between  the execution the CPU will execute the new process and the process which was in the execution will be suspended for the time being.

Non-Preemptive scheduling cannot suspend the process in between if a process is in execution it will be fully executed then other process will get executed.

Strict Non preemptive scheduling are not suitable for computer centers because it cannot execute process with more priority if it comes between the execution.

3 0
3 years ago
Create an algorithm and flowchart that will accept name of user and display it.
vivado [14]

Answer:

Algorithm

1.Start.

2.Using an input function, ask the user to input the name and store the Entered Value in string    variable.

3.Print value stored in String Variable.

4.End.

Flow chart:

5 0
4 years ago
Choose the correct answer base on the Components of Computer System
kondor19780726 [428]
1 - b - Excel is a computer program, so it'd be Software
2 - a - Process of elimination, haven't heard of the term 'peopleware' before.
3 - d - A joystick accepts input from a user to interact with a computer. ex. Flight Simulators
4 - c - A monitor will display (or output) an image based on what is received from the computer.
4 0
3 years ago
Other questions:
  • Keyboard shortcut could you use instead of clicking the icon
    11·1 answer
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • How do all apple phones work?
    7·1 answer
  • Define a function below called increase_elements_by_x, which takes two arguments - a list of numbers and a single positive numbe
    13·1 answer
  • If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the
    9·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • What is the genetic material that organisms pass on to their offspring when they reproduce?
    11·1 answer
  • The meaning of belt drives
    10·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • The BIOS performs most of the calculations, which enable a computer to function and is sometimes referred to as the “brain” of t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!