1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
6

You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C

anonical, the company that owns and maintains Ubuntu just releases an update to patch a security vulnerability in the system.
Required:
What BEST action you should take?
Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
8 0

Answer:

Explanation:

I believe that the best course of action would be to divide the companies computers and run the critical applications on half of the systems while the other half update to the latest Ubuntu release. Once that half is done updating, you run the applications on the updated systems and update the other half of the systems. This will allow the company to continue its operations without any downtime, while also updating to the latest Ubuntu release on all systems and making sure that all systems do not have any security vulnerabilities due to outdated software.

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Air bags are always safe. A. True B. False
Naya [18.7K]

Air bags are always safe. A. True<u> B. False</u>

5 0
3 years ago
Read 2 more answers
In order to manage information for a company, your website would need a/an
Eva8 [605]
The answer is database.
3 0
3 years ago
Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
Aleks04 [339]
<span>editing the image file in a dedicated photo editing program before inserting it</span>
8 0
3 years ago
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
ivanzaharov [21]
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

3 0
3 years ago
Other questions:
  • Why is wearable technology important?
    12·1 answer
  • What type of document is a mobile device's EULA?
    13·1 answer
  • Your program Assignment Write a program that reads a sentence as input and converts each word to "Pig Latin". In one version of
    15·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    11·2 answers
  • Given a Student class, create a class with following characteristics:
    6·1 answer
  • If, when asked for a date of birth, the user enters a future date, this error should be caught by a ________ check.
    8·1 answer
  • PLZ HELP !!!!! <br> plzzzz
    6·1 answer
  • Do you think communities or countries can survive without the internet?why or why not?​
    11·1 answer
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • Use the drop-down menus to describe the customize ribbon dialog box.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!