1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
5

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end securit

y system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

You might be interested in
What is the output of this program? Assume the user enters 3, 6, and 11.
erica [24]

Answer:

14.0

Explanation:

3 0
1 year ago
Which key on the keyboard do you use when you copy using Drag and Drop? The Alt key. The Ctrl key. The Shift key. None of the ab
tamaranim1 [39]
CTRL key is used indeed
6 0
3 years ago
Read 2 more answers
What does the fact that online games are so popular most likely prove?
morpeh [17]

B. Online games are an influential medium.

7 0
3 years ago
Theo would like to apply formatting to record data based on values in comparison with values in other fields. Which option shoul
poizon [28]

Answer:

Conditional Formatting

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data when required or needed.

Conditional formatting is a feature found in a lot of spreadsheet software applications such as Microsoft Excel and it avails end users the ability to apply specific formatting options to cells based on certain defined criteria.

Basically, it is used for highlighting, emphasize, comparing or differentiating between data (information) stored in a spreadsheet document i.e data values that are lesser than or greater than a specificied value.

In this scenario, Theo would like to apply formatting to record data based on values in comparison with values in other fields. Thus, the option he should use is conditional formatting.

7 0
3 years ago
Read 2 more answers
What happens during the production stage
PSYCHO15rus [73]

Answer:

Production is where the principal photography for the movie or TV show takes place.

Explanation:

During rehearsals and camera blocking, Stand-Ins work with the Director, Assistant Director, camera crew, and other crew members to block out actor movements and lighting set-ups for a scene.

4 0
3 years ago
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector i
    8·1 answer
  • Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
    6·1 answer
  • Who was responsible for unleashing the melissa computer virus
    15·1 answer
  • what are the text or graphics that are lighter than the main text located in a document's background called? themes borders wate
    7·1 answer
  • Select the correct answer.
    13·2 answers
  • How do you import an SVG file?
    12·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • Do you know how to change your grades on a printer???????????
    13·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!