1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
4 years ago
8

​The US-CERT newsletter has alerted you about vulnerabilities in some software installed in your organization. To detect if ther

e is any attempt at exploiting this vulnerability, you would employ ____-based intrusion detection system.
Computers and Technology
1 answer:
NISA [10]4 years ago
8 0

Answer:

Knowledge-based intrusion detection system.

You might be interested in
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
jonny [76]

Answer:

C. Z-wave

Explanation:

The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.

The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.

The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.

<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.

<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.

<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.

6 0
4 years ago
What are some cloud storage devices?​
ryzh [129]

i believe some are google docs, apple icloud, xdrive, MediaMax, and Strongspace

6 0
3 years ago
What is the processing speed for the second generation of computers​
natima [27]

Answer:

10mbps

Explanation:

that's what the internet says

5 0
3 years ago
Original Source Material
Deffense [45]

Answer:

b. Paraphrasing plagiarism

Explanation:

-Word-for-Word plagiarism  refers to copying words from someone else as your own.

b. Paraphrasing plagiarism refers to copying an idea from someone else making small changes without giving credit to the owner.

As the student paraphrased but didn't include the proper reference, this is paraphrasing plagiarism.

5 0
4 years ago
In large organizations, there is a formal business function that includes developing an information policy, planning for data, o
Shkiper50 [21]

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

5 0
3 years ago
Other questions:
  • Write a program that prompts the user for the shift value (e.g. 3) and then a plain-text message to encode. Encrypt the message
    5·1 answer
  • How to find no of Distinct triangles in a polygon?
    10·1 answer
  • Explain why a computer cannot solve a problem for which there is no solution outside the computer.
    14·1 answer
  • How does human error relate to security risks
    5·1 answer
  • Which of the following is the most important system if a company wants to consolidate fan data from multiple sources, i.e., exte
    11·2 answers
  • Which of the following is not a characteristic of a healthy relation?
    13·1 answer
  • चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
    11·1 answer
  • You have studied graphic design, advanced math, and programming, and you
    13·1 answer
  • WAP to input the rating of a movie, and print as per the given criteria:
    13·1 answer
  • Accenture is one of several hundred companies that has signed on to the united nations global compact (ungc) business ambition p
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!