1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
14

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log

files are sent to this location in order to be reviewed. A recent exploit has caused the company’s encryption to become unsecure.Which of the following would be required to resolve the exploit?A. Utilize a FTP serviceB. Install recommended updatesC. Send all log files through SMTP
D. Configure the firewall to block port 22
Computers and Technology
1 answer:
klemol [59]3 years ago
3 0

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

You might be interested in
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
If johnny has 800 socks and john has 1000 more how much does john have
masya89 [10]
John has 200 more socks than Johnny
8 0
3 years ago
You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
ser-zykov [4K]

Answer:

Explanation:

Since you are using Windows Server 2012 these tasks are much easier. In order to accomplish this, you simply need to click on Disk Management in the GUI and then right-click on the 200 GB drive and click on the option that says "Extend Drive". Finally, choose the max available space for the drive and click accept. This will extend the drive completely to use all of the space. The same process can be done for changing the Drive Letter and Volume Label by right-clicking the drive and choosing the corresponding option. In order to get convert the file system to NTFS (assuming it is Fat32) you simply need to open command prompt and type the following command.

convert m:  /fs:ntfs

where m is the actual drive letter of the drive in question.

8 0
3 years ago
Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
Blizzard [7]
Strings can usually be dealt with as arrays of characters.

sentence[ -1 ]

sentence.substring( sentence.size() -1 );
8 0
3 years ago
Quick!!!!!
Vlad [161]

Answer:

B. the current affairs page

Explanation:

it's a simple question

8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following class definitions. public class BClass { private int x; public void set(int a) { x = a; } public void pri
    11·1 answer
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • __________ is a program that lets you share documents online with others.
    12·2 answers
  • Comments should be written in what type of language
    6·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
    10·1 answer
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • Create a program that simulates a race between several vehicles. Design and implement an inheritance hierarchy that includes Veh
    11·1 answer
  • please help me to do this computer homework I beg you all please help me to get the answers please its important please ​
    12·1 answer
  • !!! PLEASE HELP ASAP REALLY NEED IT !!!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!