1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
12

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c

hoices
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
5 0

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

You might be interested in
I need answer pooooooo​
lara [203]
Read the instructions right, youll get ir done
7 0
3 years ago
Cooper Technologies is a technology company that offers many IT services in Chicago. The company's services and products include
natima [27]

Answer: Broad needs and many customers.

Explanation:

Broad needs along with many customers is the strategic position technique in which customers are served with the service and product through a certain channel and ways.It is used for fulfilling the numerous needs of customers in a way that other competing companies cannot serve.

  • According to the question,Cooper technologies is using broad needs and many customers strategic positioning to serve its various customers with services like repair, computer training,tracking etc.
  • Thus, they are handling numerous needs of their many customers.
5 0
4 years ago
You can align controls in the report design window using the align button on the report design tools ____ tab.
Iteru [2.4K]
<span>You can align controls in the report design window using the align button on the report design tools arrange tab.</span> This tab is used to apply different types of formatting to reports in Access. The user<span> can change one type of control layout to another,  can remove controls from layouts so that she/he can position the controls wherever you want on the report.</span>
4 0
3 years ago
What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
Semmy [17]
I think if a large number are accessing at the same time you would have to wait for many to clear up

3 0
3 years ago
A terrestrial biome is named according to the _____ in which a group of plants and animals occur together.
ikadub [295]

Answer:

Predominate Vegetation

Explanation:

3 0
4 years ago
Other questions:
  • Hich function would be used to remove a section of text from a document?
    12·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • What are some specific ways that businesses use the internet?
    6·2 answers
  • Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially em
    15·1 answer
  • Why would a team choose to employ a zone defense over a person to person defense?
    8·1 answer
  • What is another name for repetition in programming?
    11·1 answer
  • A list cannot use appendleft but a _____ can.
    11·1 answer
  • 3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
    11·2 answers
  • The choice of database does not have any impact on the relevancy of search results?
    13·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!