1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
4 years ago
13

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and

to detect infected hosts? (choose two.)?
Computers and Technology
1 answer:
allsm [11]4 years ago
8 0

Netflow and IDS (intrusion detection system) are the two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts.

The Netflow is CISCO feature used for collecting IP traffic information and monitoring network traffic on a specific interface. Similar to this, IDS is an a<span>pplication that monitors a network or systems for malicious activity or policy violations.</span>

You might be interested in
How do u friend ppl on iPhone and do I need to be at a certain level to do so?
andrey2020 [161]
Launch the game center app , tap on the friends tab , <span>tap the </span>plus sign in the upper left hand corner , <span>type in their cgme center id , then send . </span>
3 0
4 years ago
The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides u
RSB [31]

Answer:

World Wide Web (WWW)

Explanation:

Popularly referred to as the Web is an information system that comprises of many interconnected web resources and documents. These documents and web resources possess a certain URL (Uniform Resources Locators) such as https://www.brainly.com/ which makes them accessible over the internet.

The <em>HTTP or Hypertext Transfer Protocol</em> is a channel for transferring the resources of the World wide web among users.

In 1989, the World Wide Web was invented by Tim Berners-Lee. He developed the first web browser in 1990.

The World Wide Web has played a fundamental role in the advancement of the information age as it is greatly used by different people around the world to communicate efficiently.

6 0
3 years ago
A company is performing an analysis on the computers at its main office. The computers are spaced along a single row. The analys
harina [27]

Answer:

array = input("Enter the list of computer memory: ").split(',')

int_arr = [int(x) for x in array]

segment = int(input("Enter the length of segment to analyze: "))

list_len = len(int_arr)

segList = []

mini = []

for x,i in enumerate(int_arr):

   seg = int_arr[i-1:segment+i-1]

   if len(seg) == segment:

       segList.append(seg)

for x in segList:

   mini.append(min(x))

result = mini.index(min(mini))

print("Segment with the minimum memory is: ",segList[result])

Explanation:

The python program prints out the segment after analysis, with the smallest disk memory space. The code gets the array of computer rows from the user input and segments the array with the number of segment input, then the minimum is compared for all segments in the network.

5 0
3 years ago
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
levacccp [35]

The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).

cisagov

3 0
3 years ago
(20 POINTS) <br> What is one risk of introducing your new information system? Why is it a risk?
mixas84 [53]
Hardware and software failure - such as power loss or data corruption.
8 0
3 years ago
Other questions:
  • Secondary storage devices that are input and output devices include all except:
    10·1 answer
  • 1. The goals of the Safety Office of the Department of Transportation include______.
    8·1 answer
  • Which of the following is the general term used to describe software code that isdesigned to cause damage to a computer system?
    10·1 answer
  • landon starts his computer and gets message, hard drive is not found. He was watching a movie the previous night, what might the
    6·1 answer
  • How do ACLs work on a router?
    14·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • Assignment Guidelines
    12·1 answer
  • Which of the following represents a backup system that will aid in recovery for any type of disaster or disruption?
    8·1 answer
  • What makes a source credible?
    9·2 answers
  • which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!