1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
14

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log

files are sent to this location in order to be reviewed. A recent exploit has caused the company’s encryption to become unsecure.Which of the following would be required to resolve the exploit?A. Utilize a FTP serviceB. Install recommended updatesC. Send all log files through SMTP
D. Configure the firewall to block port 22
Computers and Technology
1 answer:
klemol [59]3 years ago
3 0

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

You might be interested in
Which describes the third step in visual character development
allsm [11]

I would say 3-D model!!!! not 100% sure but this sounds most correct!

5 0
3 years ago
Read 2 more answers
A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data
lesya [120]

Analyzing the metadata would be more appropriate than analyzing the data when: determining the likelihood that the photo was taken at a particular public event.

<h3>What is a data?</h3>

A data can be defined as a representation of instructions or information in a formalized manner, especially as a series of binary digits (bits).

<h3>What is a metadata?</h3>

A metadata can be defined as the data that provides information about one or more aspects of a given data, so as to provide a structured reference that helps to sort and identify all of its attributes such as:

  • Author
  • Date created
  • Date modified
  • File type
  • File size

In this scenario, analyzing the metadata would be more appropriate than analyzing the data when determining the likelihood that the photo was taken or created at a particular public event.

Read more on data here: brainly.com/question/25558534

6 0
2 years ago
Need some help writing a simple PYTHON Student registration program:
Y_Kistochka [10]

import random

database = {}

while True:

   try:

       user_choice = int(input("Enter your student id to bring up your information (Press enter if you don't have one) : "))

       if user_choice in database:

           print("Student ID:",database[user_choice][0],"\nFirst name:",database[user_choice][1],"\nLast name:",database[user_choice][2],"\nPhone number:",database[user_choice][3],"\nEmail address:",database[user_choice][4],"\nPassword:",database[user_choice][5],"\nPoints:",database[user_choice][6])

   except ValueError:

       name = input("Enter your first name: ")

       last_name = input("Enter your last name: ")

       phone_number = input("Enter your phone number: ")

       email = input("Enter your email address: ")

       password = input("Enter a password: ")

       points = 100

       student_id = random.randint(1,1000)

       while student_id in database:

           student_id = random.randint(1,1000)

       print("Hello,",name,"your student ID is:",student_id)

       database[student_id] = [student_id,name, last_name, phone_number, email, password, points]

I wrote my code in python 3.8. I hope this helps.

6 0
2 years ago
Why can i go to discord if my school blocks it-
finlep [7]

Answer:

They didn't do it right.

Explanation:

5 0
3 years ago
A client wishes to update their legacy system even though there have been no
gulaghasi [49]

Answer:

A client wishes to update their legacy system even though there have been no security breaches since its implementation five years ago. If the client has not suffered any attacks, why is it still necessary to update their system? ... Because new security threats emerge all the time.

8 0
3 years ago
Other questions:
  • What systemctl command configures a unit to start the next time the computer boots?
    10·1 answer
  • Which best describes the benefits of renting a home?
    10·2 answers
  • The max-age attribute of a cookie is specified in
    13·1 answer
  • In a five-choice multiple-choice test, which letter is most often the correct
    10·2 answers
  • Attribute variables have the same meaning as participants variables. is this true or false?​
    14·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • Can a result that contains road maps for European countries have a highly meets rating
    12·1 answer
  • You can insert video by clicking video drop-down menu on the ______ tab.
    15·1 answer
  • NO LINKS OR SPAMS THEY WILL BE REPORTD<br><br> Click here for 50 points
    5·2 answers
  • (40 PTS) Be specific
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!