1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
12

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c

hoices
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
5 0

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

You might be interested in
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
2 years ago
Read 2 more answers
What is the network id with cidr notation for the ip address 172.16.32.108 with the subnet mask 255.255.255.0?
kow [346]
172.16.32.0/24






-------------------------------
7 0
3 years ago
tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
Marta_Voda [28]
The answer to this question is b that's the answer
5 0
3 years ago
As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
pickupchik [31]

Answer:

Excel Help

Explanation:

Press F1 key to open the excel help window

Or you can also click the excel help button to launch the help window.

Type for whatever you are seeking help for and you will notice suggestions as you type something. These suggestions include online and offline results. If there are too many results then try searching offline it will narrow down the results.

After typing the text and hitting enter, the excel help returns several related topics on the searched query. You can browse through these topics and get help from excel.

5 0
3 years ago
Apples and bananas apples and bananas
melamori03 [73]

Answer:

bananas and apples bananas and apples?

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • #The Fibonacci sequence is a number sequence where each #number is the sum of the previous two numbers. The first #two numbers a
    7·1 answer
  • "the magical number seven, plus or minus two" refers to the storage capacity of ________ memory.
    5·2 answers
  • What does the following code output? System.out.println((5+20 + 5)<br> * (10 / 10))
    9·1 answer
  • A computer has the following parameters Operation Frequency Cycles Arithmetic/Logical instructions 65% 1 Register load operation
    11·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
    8·1 answer
  • Which word goes with "meals
    5·2 answers
  • ____________ is a script or a tool that obtains privileges of a root
    8·1 answer
  • Which tab do you select to change how you see your Word document on screen?
    9·2 answers
  • Anyone know why my desktop won’t turn on, I upgraded my ram and my monitor won’t turn on
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!