1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
2 years ago
7

how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local

Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains
Computers and Technology
1 answer:
juin [17]2 years ago
5 0

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
You might be interested in
What is an example of a boolean operator?
Alona [7]
Boolean operators are like AND,or,not,and not .
they are <span>used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results.</span>
3 0
3 years ago
PLZ ANSWER ASAP WILL GIVE BRAINLIEST
DENIUS [597]

Answer:

A or B would work.

If the developer tell you how to, which depends on what you ask then A would work

But Following links could give several smaller bits of info and resources required which makes B able to work

3 0
3 years ago
If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image
notsponge [240]
Won't you use a fake photo for your profile image or not put one on at all! This is a very safe way to keep your identity a secret and that you are very safe while you are online.

Hope this help!!
4 0
3 years ago
Select all the correct answers.
tino4ka555 [31]

Answer:

The correct options are:

include a numbered list of steps in the procedure

insert an image of the chocolate chip cookies  

email the recipe to her friend as an attachment

print a copy of the recipe to have handy while baking

Explanation:

Microsoft word provides several features which can be used to perform different tasks.

Lets look at each option one by one:

include a numbered list of steps in the procedure

The Bullets and Numbering" feature can be used for this purpose.

insert an image of the chocolate chip cookies

Can be inserted via "Add picture" Option

email the recipe to her friend as an attachment

"Share" option can be used for this purpose.

convert quantities measured in cups to metric units

Calculations cannot be done in MS word

print a copy of the recipe to have handy while baking

Print option can be used for this purpose.

Hence,

The correct options are:

include a numbered list of steps in the procedure

insert an image of the chocolate chip cookies  

email the recipe to her friend as an attachment

print a copy of the recipe to have handy while baking

7 0
2 years ago
Configuration reviews are not needed if regression testing has been rigorously applied during software integration.
goldfiish [28.3K]
B) False, reviews and constant matinese is always needed, reviews help the creators understand what people think needs work and what they like, the updates on the site will implement these wants and needs.
8 0
3 years ago
Other questions:
  • A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
    15·1 answer
  • 4. How do artistic designing and engineering designing differ? How do they overlap?
    11·1 answer
  • If a clean install is performed on a hard drive with a previous install of windows and the drive is not re-formatted during the
    9·1 answer
  • A group consists of 10 kids and 2 adults. On a hike, they must form a line with an adult at the front and an adult at the back.
    10·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
  • Approximately how long did it take, in minutes, for the body to return to normal after the intake of water.
    11·1 answer
  • Answer for 3.4.8 rectangle code HS
    9·1 answer
  • Wendell notices that the company's top executives share a belief that managers are directly responsible for the organization's s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!