1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
7

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional imp

act categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario
Computers and Technology
1 answer:
Anna35 [415]3 years ago
7 0

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

You might be interested in
In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
Katyanochek1 [597]
Debugging i think it is
3 0
3 years ago
A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
Darya [45]

Answer:

nslookup is the correct answer to the following question.

Explanation:

The following answer is correct because It is the tool or the utility of the command line by which an administrator to query a DNS(Domain Name System) for finding the domain name or the Internet Protocol address or many other records.

<u>Steps to use nslookup:</u>

  • Firstly, you have to press the window key + R to open run.
  • Then, you have to type cmd in it and press enter.
  • Then, cmd will appear after that, you have to type the command 'nslookup' and then press enter.
  • Then, it shows the default server name and ip address after that, you have to type an ip address of DNS server.
  • Then, you have to type 'set' then type q=M X and then press enter
  • Then, you have to type the name of your domain then, press enter key.

7 0
3 years ago
*explain why computer literacy is vital to access in today’s business work
kkurt [141]

Answer:

Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.

The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.

8 0
3 years ago
In which stage of the SDLC is it most appropriate to use prototyping?
bixtya [17]

<u>Answer:</u>

<em>When system feasibility is being determined </em>

<u>Explanation:</u>

<em>Prototyping is the part of Requirement and Analysis phase. </em>It is the phase where the client and the development team sits and discuss about what the requirement is and show <em>a model of what are all the things which they could bring up the requirement as a software. </em>

So here, the prototyping is really essential to visually understand how the team has interpreted the requirement and how far it matches with the client. <em>All the other options stands invalid in the given context.</em>

7 0
3 years ago
Read 2 more answers
How can you protect yourself from internet hoaxes cyber awareness?
Kipish [7]
Only add or follow people you know and trust make sure your account is nothing but positive
3 0
3 years ago
Other questions:
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • Factor f(x)=x^3-6x^2+9x
    12·1 answer
  • When you need to move data over long distances using the internet, for instance across countries or continents to your amazon s3
    5·2 answers
  • Which of the following is not a type of bank? (Everfi)
    9·2 answers
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • CH4 has how many of each type of atom?
    11·1 answer
  • Why is computer economics important?​
    10·1 answer
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!