1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
6

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root

kit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and feature UEFI and TPMs. Which of the following technical options would provide the MOST preventive value?
A. Update and deploy GPOs
B. Configure and use measured boot
C. Strengthen the password complexity requirements
D. Update the antivirus software and definitions
Computers and Technology
1 answer:
Maslowich3 years ago
4 0

Answer:

<em>The following techinical options that would provide the most preventive value would be LETTER D.</em>

Explanation:

<em>Updating the antivirus is the best way to keep your computer free of malwares, trojans, and other kinds of threats. When you update your computer software and antivirus constantly, you prevent damages such as: data loss, computer invasion, and hacking attacks. </em>

<em>Following the correct computer practice and keeping your system constantly updated is the best way to protect your machine from any threat. </em>

<em></em>

You might be interested in
after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching wa
dusya [7]
  • After teaching a group of students about drug measurement and calculation systems, the instructor determines that teaching is successful when students can identify which metric system is the most widely used system.

  • The metric system is a measurement system for something that is done in a study and calculation. An example of a metric system is the meter used to measure length, grams to measure weight, milliliters to measure volume.

  • In this case, we can take an example from the application of the metric system in the world of health. A nurse uses the metric system to calculate doses and uses the liter as the base unit for measuring fluids.

Learn more about Metric System here brainly.com/question/1764307

#SPJ1

7 0
1 year ago
The diagnostic test that involves watching a computer monitor with alternating checkerboard patterns while an eeg is performed i
kolezko [41]

Answer:

VER.

Explanation:

The diagnostic test that involves watching a computer monitor with alternating checkerboard patterns while an ecg is performed is known as a​ VER.

6 0
3 years ago
Read 2 more answers
Mathematical computations by a computer are faster than your quickest mathematical computations because the top speed of a neura
Tema [17]

Answer:

3 million

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the top speed of a neural impulse is about 3 million times slower than the speed of electricity through the wired circuitry in a computer. Neurons have been calculated as firing roughly 200 times per second, while a computer processing unit processes at about 600 million instructions per second.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
sveta [45]
You can use it to suggest edits for the document.

You can use it to make a note of clarification for someone else examining the document.

You can use it to cover up mistakes within the document.

That's what I think.
7 0
3 years ago
. Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police r
Minchanka [31]

A crime problem in my community is related to cell phone theft. According to the local newspaper, it is estimated that in my city about 10 cell phones are stolen per week. Still according to the local newspaper, most of these robberies occur in the city center and in the periphery, with women being the biggest victims.

Although the police have shown themselves to be a restraining force on this type of crime, few arrests have been made successfully, mainly for the negligence of the victims in providing a complaints.

The main driving force behind this crime is drug trafficking. Most burglars steal cell phones to sell them and have money to buy drugs. This is totally related to the government's neglect to promote quality education in the city, allowing several children and young people to stay on the street and run the risk of becoming involved in the traffic.

A cause and effect diagram for this situation is:

Irresponsible government ---> poor quality education ---> children and adolescents on the streets ---> involvement in drug trafficking ---> theft of cell phones ----> frightened population --->  lack of complaints ----> criminals on the street.

3 0
3 years ago
Other questions:
  • What does FTP stand for?
    15·2 answers
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • What is the term for the conversion of a bitmap image to a vector image?
    8·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    11·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • A customer has contacted you to help him alleviate a large amount of time and effort that goes into adding and removing users wh
    14·1 answer
  • Difference between positional and non positional number​
    12·1 answer
  • How i simplify this boolean expression ?A'.B'.C'+A'.B'.C+A'.B.C+A.B'.C+A.B.C
    6·2 answers
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!