1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
7

how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local

Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains
Computers and Technology
1 answer:
juin [17]3 years ago
5 0

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
You might be interested in
When should you use the Reply All function when replying to an email
Dmitrij [34]
When the email was sent as a group email 

5 0
3 years ago
Read 2 more answers
Which feature was the first app available on a cell phone? A. Game B.contact list C.email D.ringtone
Oduvanchick [21]

Before cellphones are able to be used to browse the internet, play games, record videos and take photos, its main purpose is similar to a telephone, albeit it is more portable. Early cellphones would not have games for you to play, not would it have emails for you to check, read, and reply to. Though ringtones might seem as an acceptable option, early cellphones would also have many selections or even any for you to choose.

Thus, the best option would be (B) contact list, which is necessary for a cellphone to have since the owner would need the number to be able to make a call.

8 0
3 years ago
What do customers use to access the internet, usually for a monthly fee?
kati45 [8]
To search things like answers,order things on Amazon,or go watch videos on Youtube
4 0
3 years ago
Enzymes_____________.
lord [1]

Answer:

b. speed up chemical reactions.

Explanation:

brainly plz

4 0
3 years ago
Your Windows client systems are joined to the WestSim domain. To ensure correct time stamps are used, you need to verify that th
natita [175]

<u>Full question:</u>

Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.

Which command can you use to do this?

• w32tm /tz

• w32tm /monitor

• w32tm /register

• w32tm /query /status

<u>Answer:</u>

w32tm /tz command can you use to do this

<u>Explanation:</u>

W32tm.exe is the approved command-line mechanism for configuring, monitoring, or troubleshooting the Windows Time service. This mechanism is a portion of the default connection between Windows and Windows Server. One can use W32tm.exe to configure Windows Time service settings and to diagnose time setting obstacles.

The syntax is W32tm </parameter> </param2>. w32tm /tz will represent contemporary time zone settings. The Windows Time service is not a full-featured NTP clarification that convenes time-sensitive reinforcement requirements, and it is not verified by Microsoft as such.

6 0
3 years ago
Other questions:
  • Explain why the game of economics has no winner
    8·1 answer
  • A ________ restricts the number of a certain type of product that can be imported into a country.
    5·1 answer
  • How do u know when a website doesnt like u?
    11·1 answer
  • Why is the ketboard calledQWERTY
    11·2 answers
  • The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU equivalent names in the different
    15·1 answer
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • 10. Differentiate between equity share &amp; preference share.​
    11·1 answer
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • Please Answer ASAP!!
    15·1 answer
  • Which statements describe the advantages of using XML
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!