1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
9

URGENT!!!

Computers and Technology
1 answer:
LenaWriter [7]3 years ago
8 0

Answer:

transaction

Explanation:

You might be interested in
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
Which of the following statements are true of
Gennadij [26K]

Answer:

Option A - They are responsible for writing programming

Option B - They are usually strong problem-solvers

Explanation:

A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.

Hence, both option A and B are correct

8 0
2 years ago
Create a new Die object. (Refer to Die.html for documentation.)Create a loop that will iterate at least 100 times. In the loop b
hjlf

Answer:

Java code is given below

Explanation:

import java.util.Random;

class Die{

private int sides;

public Die(){

sides = 6;

}

public Die(int s){

sides = s;

}

public int Roll(){

Random r = new Random();

return r.nextInt(6)+1;

}

}

class DieRoll{

public static void main(String[] args) {

Die die = new Die();

int arr[] = new int[6];

for(int i=0; i<6; i++)

arr[i] = 0;

for(int i=0; i<100; i++){

int r = die.Roll();

arr[r-1]++;

}

for(int i=0; i<6; i++)

System.out.println((i+1)+" was rolled "+arr[i]+" times.");

}

}

8 0
3 years ago
School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum.
Lyrx [107]
The answer that best fits the blank is ISOLATED FROM. Those technology skills and subject-specific skills that are separated from the rest of the curriculum are being taught using the school computer laboratories. Technology skills include skills that use computers or machines such as web design, email management, database and spreadsheets, and etc.
8 0
3 years ago
What type of document is a mobile device's EULA?
MakcuM [25]
EULA stands for End User License Agreement. This document is the contract between the software application author or publisher and the user of that application. It is also called "software license", because it establishes the purchaser's right to use the software on the mobile device. T<span>he user agrees to pay for the privilege of using the software, and promises the software author or publisher to comply with all restrictions stated in the EULA. </span>
6 0
3 years ago
Other questions:
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    7·1 answer
  • Sharing a workbook helps to complete ________ (A, tasks) (B,changes) (C, typing) on time. Multiple people acssessing the workboo
    9·1 answer
  • This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time
    13·1 answer
  • Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should
    11·2 answers
  • ____ is the most widely used language for writing system software because it combines the power of a high-level language with th
    12·1 answer
  • Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. B
    10·1 answer
  • Write a program that inputs a five-digit integer, spearates the integer into its digits and prints them seperated by three space
    6·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • True or False? Popular sites are always mean accurate.
    14·2 answers
  • A new thread begins its life cycle by transitioning to the ________ state. Group of answer choices new runnable waiting terminat
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!