1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
12

A vulnerability is a condition or weakness in (or the absence of) security procedures, technical controls, physical controls, or

other controls that could be exploited by a threat.
Law
1 answer:
madreJ [45]3 years ago
6 0

Answer:

this is correct, is this cyber security or ccna ?

Explanation:

I can provide you with a good content for ccna

You might be interested in
I need Help with this ASAP!?
Mars2501 [29]
I would personally pick b
But most officers use force to formalize an arrest as there’s multiples ways to reduce force instead of hands on. I would choose c but b could be a possibility as wel
4 0
3 years ago
Please help (For MUN)
ivann1987 [24]

Answer:

A solution to locate and punish cyber intruders is to promote software capable of identifying the IP of intruder computers, that is, those that do not have an IP authorized by the software. This software must also be able to store unauthorized and therefore intrusive IPs.

Explanation:

DISEC is the acronym that refers to the Disarmament and International Security Committee, which is a UN department that deals with global disarmament issues, with the aim of promoting security and combating threats to world peace. It is extremely important that the files and work of the DISEC community, be restricted to people who work directly with this, for this reason, it is necessary that strategies are created that prevent cybernetic invaders from having access to any information in this sector. In this case, it would be beneficial to create software capable of identifying and storing the IP of attacking computers, allowing these attackers to be found and punished.

A computer's IP is an identifier of the computer, the network used for access and the location where access was made. By having the IP of invading computers, the UN would have access to the location of the users of these computers, being able to find and punish them.

3 0
3 years ago
The Bill of Rights consists of the first
Nikitich [7]

Answer:

10

Explanation:

no explanation needed

7 0
3 years ago
Read 2 more answers
As you increase your use of alcohol and other drugs your ability to safely operate a motor vehicle decreases
Alekssandra [29.7K]
True. Increasing your intake of alcohol and drugs decreases your ability to operate a motor vehicle.
8 0
2 years ago
The use of turn signals as a signal to the driver of other vehicles that it is safe to pass is:
Serga [27]

Answer:

This is correct.

8 0
2 years ago
Other questions:
  • The violation of a duty is called?​
    15·2 answers
  • Ddddddddddddddddddddddddddddddddd<br>ddddddddddd
    5·2 answers
  • If both the president and the vice president can no longer serve, then who is the next executive?
    15·1 answer
  • What is the hardest part of being a Jury Member in Court?
    14·2 answers
  • A defendant can appeal his conviction on what two grounds?
    11·1 answer
  • Define the following
    15·1 answer
  • What types of accomplishments make some prisedents better than others?
    5·1 answer
  • It would be inefficient to have a full election every time a decision is required by the government. So the US public elects off
    8·1 answer
  • 1. After the passage of the 13th, 14th, and 15th Amendments, African Americans continued to experience political and economic op
    12·1 answer
  • Which one is NOT a misdemeanor?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!