1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
10

Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security

goals (1) prevent the attack (2) detect the attack or (3) recover from the attack. Depending on the situation or application, you have to adopt one of these security goals. For each of the following statements, give an example of an application or situation in which the statement is true.
(i). Prevention is more important than detection and recovery
(ii). Detection is more important than prevention and recovery
(iii). Recovery is more important than prevention and detection
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
8 0

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

You might be interested in
"ikev2 requires the use of which of authentication protocol?"
katen-ka-za [31]
Ikev2 requires the use of authentication protocol called Extensible Authentication Protocol (EAP).  It is <span>is a protocol for wireless networks that ampiflies on the authentication methods for the Point-to-Point Protocol (PPP).</span>
4 0
3 years ago
An internet layer is a quantity of data that is transmitted on a netowrk without concern for whether it is accurate or whether i
satela [25.4K]

Answer:

False

Explanation:

The statement being made here is a False statement. An internet layer is not necessarily a quantity of data but instead, it is a group of various different codes, programs, and protocols that allow from the data to travel safely from one endpoint to the other. This is what allows one user from one side of the world to send information to someone else who can receive it from the other side of the world through the internet.

7 0
3 years ago
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
lutik1710 [3]

Answer:

I have created and attached an image with example values for this question.

First we'll learn the IF function syntax:

IF(logical_test, value_if_true, [value_if_false])

Where

logical_test is the decision making comparison

value_if_true is the result to return when TRUE

value_if_false is the result to return when FALSE

We assume that cells B10 to G10 contain the Total Sales for January to June. And cells B17 to G17 contain the Commissions for January to June.

a.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;True;False)</em>

<em />

b.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;False)</em>

<em />

c.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;B10*0.27)</em>

<em />

d.

To copy the formula in B17 to C17:G17, you can just copy and paste or select cell B17 and drag from the black square on the bottom right of the cell.

8 0
3 years ago
Read 2 more answers
Ports that are generally used to establish outbound connections are known as ___ ports.
aivan3 [116]

Answer:

Ephemeral

Explanation:

3 0
4 years ago
Other questions:
  • An example of an unaltered material used to create objects is
    14·1 answer
  • On a chart created in excel, the horizontal axis is also called the ____.
    15·1 answer
  • The acronym LAH stands for
    14·2 answers
  • The __________ determines whether coolant should be pumped back into the engine directly or cooled first.
    15·1 answer
  • the list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer
    14·1 answer
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • Is doing free lancing from age 16 good or bad?​
    15·1 answer
  • HELP ME PASS!
    10·1 answer
  • The electors in each state shall have the qualifications requisite for electors of the most numerous branch of the state legisla
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!