1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
5

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end securit

y system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

You might be interested in
A written guarantee to fix or replace an item is called a _____.
VladimirAG [237]
A warranty is a statement given by the manufacturer or other company
3 0
4 years ago
Read 2 more answers
Encoding is the process:
vodomira [7]

Answer:

Of translating an idea or a thought into a code

Explanation:

Encoding is the process of translating an idea or a thought into a code.

For example:

You want a friend to get you a gaming Laptop as a birthday gift, while describing the specification and how the laptop should look like. You visualize a fast laptop in black cover. You tell your friend it is "fast and portable". You translate your perceptions on a particular laptop into words that describe the model.

5 0
3 years ago
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
Low-level programming languages are considered closer to human languages, making them easier for programmers to learn and use.
zubka84 [21]
I think the answer is True I hope it helps
4 0
3 years ago
A _____ system allows a customer to request a fax using email, via the company website, or by telephone.
balu736 [363]

A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

<h3>What is faxback?</h3>

Faxback (usually uncountable, plural faxback) An interactive electronic service permitting documents to be downloaded via fax machine. FaxBack searches a pre-assigned database to validate numerals provided while at the same time recovering a caller's name and fax number. Callers without an account can hear a message in- structing them on how to receive an account or be given the option of furnishing a credit card.

FaxBack Fax Machine Solutions add features to the fax machine equivalent to how VoIP added components to the phone: receive fax notification via email and track, archive, and manage faxes via the fax server or service provider control panel.

Hence, A faxback system allows a customer to request a fax using email, via the company website, or by telephone.

To learn more about faxback refer to:

brainly.com/question/13735750

#SPJ4

4 0
1 year ago
Other questions:
  • What is a motherboard?
    6·2 answers
  • What is the opportunity cost of computers when moving from point A to point B? -15 DVDs b. What is the opportunity cost of compu
    13·1 answer
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • You need to set up a network that needs to span multibple buildings. For this reason, you want to use the cabling that supports
    10·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page? A. B. C. D.
    8·1 answer
  • Audio editing software contains several codecs that allow you to
    15·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • Aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!