1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
2 years ago
5

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end securit

y system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?
Computers and Technology
1 answer:
KatRina [158]2 years ago
7 0

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

You might be interested in
A cell reference is also called a cell _______.
viva [34]
A cell reference is also called a cell address.
7 0
2 years ago
Production cost can be reduced using technology. Explain
Black_prince [1.1K]

Explanation:

By reducing the time the use on unnecessary tasks. And you would be able to operate on using your time on beneficial tasks

3 0
3 years ago
Before you can use a navigation control, you must _____. A. configure the web.config B. configure the global.asax C. configure t
natita [175]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
Which one of the following pieces of information would be allowed as part of a limited data set?
Inessa05 [86]
Phone number would be allowed
6 0
3 years ago
When did the silent movie era end?<br> A.1919<br> B.1929<br> C.1939<br> D.1949
11111nata11111 [884]

Answer:

The answer is 1929.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What are pixels that are the exact same between multiple frames called?
    15·1 answer
  • Which measure should you take for the periodic maintenance of your computer? You need to invest in a for_______________ the peri
    15·2 answers
  • What are the coordinates of (3 comma space 8 )relative to the basis open curly brackets space (1 comma space 1 )comma space (0 c
    15·1 answer
  • What are motion graphics?
    9·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • Where could an identity thief access your personal information?
    13·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • Tier 1 networks form the internet ____.​
    15·1 answer
  • Create a text file content.txt and copy-paste following text (taken from Wikipedia) into it: A single-tasking system can only ru
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!