1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
12

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c

hoices
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
5 0

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

You might be interested in
Different between input and output device​
chubhunter [2.5K]

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

8 0
3 years ago
Which describes the "Network Effect?"
Lorico [155]

The statement which best describes the network effect is a platform becomes more useful as more people join and use it.

<h3>What is "Network Effect?"</h3>

Network effect is the theory which tells that when the number of person increases in a network, then the value of the product or service in that network is also increases.

Key points of network effect are listed below:

  • In the network effect the value of product or service of a network increases when the more people join and use it.
  • Network effect is well utilized by e-commerce companies by promoting their business through the customers.
  • The best example of network effect sides are social media sites.

Thus, the statement which best describes the network effect is a platform becomes more useful as more people join and use it.

Learn more about the network effect here;

brainly.com/question/26199042

#SPJ1

4 0
2 years ago
What is best android apps​
natima [27]

Answer:

brainly

Explanation:

cuz yeah its the best app ever tbh

8 0
3 years ago
Read 2 more answers
viết phương trình nhập vào bàn phím một dãy số nguyên a1,a2 ....ăn gồm n phần tử nguyên hãy đếm xem trong dãy a có bao nhiêu phầ
Alina [70]

Answer:

Wala ko ka sabot ana oy sorry

5 0
3 years ago
Read 2 more answers
A T-1 system multiplexes ___ into each frame
zimovet [89]

Answer:

PCM encoded samples from 24 voice band channels

Explanation:

The Multiplexer from a lot of inputs generates one single output. And it is the select line that determines which of the input is going to influence output. And the select lines determine the increase in the quantity of data that can be sent through the network in a given amount of time. And this is termed as a data selector. Please note, this is application of multiplexer in data transmission.

And now coming to the T1 carrier system, it is a time division multiplexor, which multiplexes the PCM encoded samples coming from 24 band channels that require to be transmitted over an optical fiber or single metallic wire pair. And for this question, we need what is being multiplexed, and that is as mentioned in the Answer section.

4 0
3 years ago
Other questions:
  • True or false: Sony is the company behind the creation of the ‘Super Mario Bros.' franchise.
    8·2 answers
  • Write a while loop that prints
    13·1 answer
  • What is the purpose of OPPA? A. It regulates the strength of passwords chosen by the users. B. It prohibits the use of informati
    11·1 answer
  • What two skills are most important for a meteorologist
    14·2 answers
  • Match each label to the correct location on the image match the process to its characteristics
    14·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • PLEASE HURRY! Match terms in the first column with the order descriptions in column two.
    12·1 answer
  • Topic: Pseudo-codes
    9·1 answer
  • Realiza una tabla acerca de los escenarios de usos más comunes de Excel.
    15·1 answer
  • What is a saved link to a particular web page?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!