1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
5

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end securit

y system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

You might be interested in
Which decimal number is equivalent to this hexadecimal number?<br> F8
emmainna [20.7K]

Explanation: The numbers in a hex are the same as decimal numbers: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. The big difference between a hex and a decimal is that a hex also contains letters. These letters are: A, B, C, D, E, F. A hex number can be represented using a subscript of 16.

3 0
3 years ago
Read 2 more answers
It keeps saying “something is going wrong oops!” when i click on my brainly notifications what do I do
AveGali [126]

Answer:

check your app permissions it may be blocking them or try resetting the app

4 0
3 years ago
SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
IRINA_888 [86]

Answer: (B) <em>False</em>

Explanation:

SecOps also known as the Security Operations is referred to as a collaborative or combined effort between Information Technology security and the operations teams that tend to integrate technology, tools, and processes in order to meet the collective aim goals and aim of keeping an organization and enterprise secure while on the other hand reducing risk and also improving organizations agility.

5 0
3 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
The acronym LAH stands for
Nina [5.8K]
D.Limited Access Highway
5 0
3 years ago
Read 2 more answers
Other questions:
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    5·1 answer
  • How to access files on different computer same network
    14·1 answer
  • Which command will display the current contents of non-volatile random-access memory (nvram)?
    14·1 answer
  • Which information is considered free for use?
    9·2 answers
  • Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building
    15·1 answer
  • Which best describes a difference between transcription and DNA replication
    8·2 answers
  • You want to look up colleges but exclude private schools. Including punctuation, what would you
    9·2 answers
  • Peripeteia is also referred to as __________.
    5·2 answers
  • Which of the following is true about advertisements?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!