1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
10

Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security

goals (1) prevent the attack (2) detect the attack or (3) recover from the attack. Depending on the situation or application, you have to adopt one of these security goals. For each of the following statements, give an example of an application or situation in which the statement is true.
(i). Prevention is more important than detection and recovery
(ii). Detection is more important than prevention and recovery
(iii). Recovery is more important than prevention and detection
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
8 0

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

You might be interested in
which network component connects a device to transmission media and allows the device to send and receive messages?
krok68 [10]

Answer: Hello!

Network Interface Card (NIC)

Explanation:

Mark me brainest please. Hope I helped! Hope you make an 100%

-Anna♥

5 0
3 years ago
Guys, what does Product Analysis mean? please say it in a simple way.
ValentinkaMS [17]

Answer:

edp

Explanation:

4 0
3 years ago
Which domain indicated the website is sponsored by the university or college
Pie

The answer is edu. Hope this helps.


3 0
3 years ago
Suppose your school’s computer lab provides high-end architecture software that can be accessed from any lab computer, but a max
LenKa [72]

Answer:

Multiple-user licence.

Explanation:

A multiple-user licence allows the software to be accessed by the maximum number of users specified within the licence. In this scenario, it is 5 students, the connections are concurrent, meaning at any given time there can only be five users running the software. The software can be installed on more than 5 computers, but the number of active users is limited to 5.

3 0
3 years ago
What are Loop Errors? Describe briefly. What aresymptoms of Loop Errors?
victus00 [196]

Answer:

The errors in the loop condition such that it is not giving desired results or it is not running accordingly.There are different types of loop errors which are as following:-

1.Infinite loop:-When the is not able to stop then the error is called infinite loop. for ex:-

int i=1;

while(i!=0)

{

cout<<"I am King"<<endl;

i++;

}

2.Off by one error:-This error mostly happens in loop for arrays as indexing of the array is from 0 to size-1 .So looping over the array up to the size is a off by one error.

3.Equality v/s assignment operator error:-In this error the condition in the loop is like this d=f which is wrong since = is assignment operator it assigns the value of f to d while d==f checks that the value of d and f are equal or not.

4.&& v/s || loop error:- In this error we use and operator (&&) instead of or operator (||) and vice versa.

symptoms of loop errors are not the desired output.

4 0
3 years ago
Other questions:
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • ---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o
    9·1 answer
  • Match each code snippet to its appropriate markup language name
    12·1 answer
  • Which feature helps an edit-test-bug cycle work faster in the python programming language?
    15·2 answers
  • How are mathematics and computer science similar? Discuss any connections between numbers, logic, and other elements.
    14·1 answer
  • List out the storage measurements units of a computer .<br><br>​
    10·2 answers
  • An epic games service is unavailable at the moment
    8·1 answer
  • Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!