Answer:
A. Sandboxing
Explanation:
The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.
Answer: Probability/impact risk matrix
Explanation: Probability/impact risk matrix is type of matrix that defines the probability as well as impact that depicts whether the risk is low ,high or moderate.
Impact matrix is sort of tool which helps in conversion of any plan into a action. Probability matrix help in defining the chances in defining the risk.The positioning of the impact value of risk is plotted on the vertical axis and performance value on the horizontal axis.
Thus probability/impact matrix is the correct tool for the problem mentioned in the question.
A computational instruction with operands is command so computational instructionis just a opcode.
B. opcode
Complete Question:
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?
a) Bastion Host
b) Screened subnet
c) Screened host
d) Screened
Answer:
b) Screened subnet
Explanation:
In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.
Screened subnet firewall architecture is designed to host servers that offer public services.
In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.
<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>
1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.
2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.
3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.
<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>
Answer:
If your cpu usage levels are greater than 90% during most of your work session, a faster CPU can greatly increase your computer's performance
Explanation:
CPU usage level is a good indicator for the computer performance.
Generally, computers use a low portion of their CPU power. When you open an application or listen to music on your computer, CPU usage level increases. After CPU intensive process ends, the CPU usage should drop to lower level again.
But if the CPU usage level is high all the time you use the computer, then it means that either there is a problem causing continuous CPU usage or your CPU is not fast enough. In the case of latter, you'd better to have a faster CPU.