1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
7

how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local

Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains
Computers and Technology
1 answer:
juin [17]3 years ago
5 0

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
You might be interested in
A prime number is a number that is only evenly divisible by itself and 1. For example, the number 5 is prime because it can only
Advocard [28]

Answer:

I need some time i answering your question please follow me and thank(sanybody have any friends cute girl or cute sardarni he is my classmate His name Was Kushi ask to Please follow me)

4 0
2 years ago
__________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
klemol [59]

Answer:

Business Intelligence .

Explanation:

Business intelligence is a type of technology that is used by enterprises for the analysis of the data about the information of the business intelligence converted the usefulness data into its corresponding  information which is meaningful.

The main function of the business intelligence for organizing the data, analyzing the data, and providing access data to the manager as well as for the other enterprise for the decision making activity.

6 0
3 years ago
What is the minimum number of different résumé formats that an individual should have prepared?
Degger [83]

Answer:

The minimum number of different resumes formats that an individual should have prepared is b. 2 The first should be a condensed format. A good resume should only require one page. However, when things get too cramped in a single page, a two-page format can be used. A two-page format can be used to provide more details about yourself.

Explanation:

5 0
2 years ago
which type of group found in server 2008 is used to provide access to resources for all users and guests​
evablogger [386]

Answer:

Everyone

Explanation:

There are various types of groups found on the server 2008, and everyone is one out of them. Here we are required to provide them access to the resources to all the users as well as the guests. And hence, we need to provide all the access to the resources. Thus, the correct option here is certainly everyone, which is an option available in the server 2008.

5 0
3 years ago
What is bugtraq?
beks73 [17]

Answer:

The answer would be (C) An industry mailing list provided by Symantec that reports new vulnerabilities as they are discovered.

I hope this helped!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Samantha plans an investigation in which she will study a population of animals. Which of these answers best describes the focus
    8·1 answer
  • What is the smallest unit of data on the hard drive?
    5·1 answer
  • If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
    12·2 answers
  • Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
    15·1 answer
  • Word processing programs, spreadsheet programs, email programs, web browsers, and game programs belong to what category of softw
    13·2 answers
  • The federal government is the largest employer of cybersecurity professionals true or false
    5·1 answer
  • A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
    11·1 answer
  • Dynamic addressing: __________.
    12·2 answers
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
  • even if we reach that state where an AI can behave as human does,how do we measure if AI is acting like a human?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!