1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
2 years ago
10

An important principle in information security is the concept of layers of security, which is often referred to as layered secur

ity, or defense in depth. Which of the following is not an example of a layer of security?
Computers and Technology
1 answer:
Eva8 [605]2 years ago
5 0

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

You might be interested in
According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
AURORKA [14]

Answer:

informed; consent

Explanation:

According to the ethical computer use policy, users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules.

6 0
2 years ago
Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are com
jeyben [28]
<h2><u>ANSWER</u><u>:</u></h2>

  1. <u>TRUE</u>
  2. <u>FALSE</u>
  3. <u>FALSE</u>
  4. <u>TRUE</u>
  5. <u>TRUE</u>
<h2><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u></h2>

<u>CARRY</u><u> </u><u>ON</u><u> LEARNING</u>

<u>CAN</u><u> </u><u>YOU</u><u> BRAINLEST</u><u> ME</u><u> PLEASE</u>

6 0
2 years ago
Read 2 more answers
What environmental concern will hybrid cars address?
Over [174]
The answer to the above question is:
d. all of the above
5 0
3 years ago
Read 2 more answers
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
Gnesinka [82]

ANSWER: Kim has chosen a dark-colored design theme for her presentation. She should therefore choose <u>a bright </u> font color that will <u>contrast with  </u>the background color.

5 0
3 years ago
Read 2 more answers
Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
statuscvo [17]

Answer:

I think it was about cheaper ads on Instagram and how they are lowering their prices.

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Field names should NOT start with a(n) -<br> hyphen (-)<br> Oa<br> asterisk (*)<br> space()
    8·1 answer
  • Conversion of a continuous stream of sound into a series of ones and zeroes that can be interpreted by computers results in
    12·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • Another personal question- are there any messaging sites that MIGHT work if most things are blocked via the school? I doubt anyt
    11·2 answers
  • Saving a file as a new filename can be accomplished through the Save As dialog box.
    13·1 answer
  • What is a directed graph?
    5·1 answer
  • How to cancel branly subscription??​
    8·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter.
    12·1 answer
  • Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
    9·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!