1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
14

A company has critical systems that are hosted on an end-of-life OS. To maintain operations and mitigate potential vulnerabiliti

es, which of the following BEST accomplishes this objective?
A. Use application whitelisting.
B. Employ patch management.
C. Disable the default administrator account.
D. Implement full-disk encryption.
Computers and Technology
1 answer:
Olenka [21]3 years ago
3 0

Answer:

A. use application white listing

Explanation:

You might be interested in
In database software, which option is the most appropriate menu choice or command to use if you want to change the format of the
sleet_krkn [62]

Answer:

I think it's d

Explanation:

             

4 0
3 years ago
Assume the variable costOfBusRental has been declared as an int and assigned the amount that it costs to rent a bus. Also assume
Basile [38]

It’s a total price divided to a number of riders involved. So costPerRider = costOfBusRental/maxBusRiders

4 0
3 years ago
Which of these utility tools would you least expect a support agent to find useful to increase security for end users?
tia_tia [17]

Answer:

b. Network performance monitor

Explanation:

A utility tool can be defined as a software application or program designed to add more functionality to a computer system, as well as to improve its performance efficiently. Some examples of commonly used utility tools in computer are file and folder backup tools, file management, antivirus, hard disk diagnostics, registry cleaner, network performance monitor, screensavers etc.

In the context of increasing security for the end users, the most important utility tools are;

1. Antivirus utility: to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

2. Rootkit utility: it can be used to detect and remove any rootkit program that is hidden in a computer.

3. Spyware utility: this is used to detect, remove and prevent malicious adware that are found in software applications.

<em>However, a network performance monitor is a utility tool that would be found to least support an agent in increasing security for end users because it is a utility tool that is primarily used to monitor network traffic and amount of data usage. </em>

7 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
Given a floating-point variable fraction, write a statement that writes the value of fraction to standard output. Do not write a
sertanlavr [38]

Answer:

The statement to this question is "cout << fraction;".

Explanation:

In the given question it is declared, that a floating-point variable "fraction" is defined, which holds some value. To print this variable value in C++ program we use the print function, which is "cout". This function also used to print messages and values, in this question the print function uses the float variable "fraction", which prints variable value.

8 0
3 years ago
Other questions:
  • Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance tha
    5·1 answer
  • A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be disp
    15·2 answers
  • Lucky Sevens. Given a whole number, compute and display how many digits in the number are 7s. For example, the number of 7s in 3
    8·1 answer
  • A Python data model defining the state of a game for Tic-Tac-Toe. You must fully describe the notion of a state of the game, lim
    7·1 answer
  • 2. (8 points) When creating the Academic Database, there were several instances of data
    11·1 answer
  • List safety conditions when downloading shareware, free free where, or public domain software
    14·1 answer
  • How can a user access the Mailbox Cleanup tools?
    11·2 answers
  • In three to five sentences, describe how you would move a slide from the end of the presentation to the second slide.
    7·1 answer
  • 5. What skill is unique to reading online?
    14·1 answer
  • Change the file name for index.html to index.php
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!