1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
Which structural semantic will this HTML code snippet form?
Yakvenalex [24]

Answer:

D. Block

Explanation:

Semantic HTML or semantic markup is HTML that introduces meaning to the web page rather than just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph. This is both semantic and presentational because people know what paragraphs are, and browsers know how to display them.

3 0
2 years ago
B. Identify the purpose of each of the following types of utility programs
olya-2409 [2.1K]

<u>These are the types </u>:

1. Antivirus software : Detects and removes virus and malwares from   computer system.

2.Disk defragmenter : Reduces the fragmented space in the disk.

3.Disk cleaner : Build to find and delete unwanted files to free the disk space.

6 0
4 years ago
How do I create a videogame
mote1985 [20]

Answer:

-Learn how to code

-Make Character

-Design

-Go to classes

-Go on video game platforms and make an video game(rblx is the best in my opinion)

-Play video games and see the scripts

-Decide what type of video game your making(horror, family game, battle game, etc.)

Explanation:

3 0
3 years ago
Write one for loop to print out each element of the list several things. then write another for loop
Kay [80]

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

6 0
3 years ago
1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b.
Olegator [25]

Answer:

Option A

Explanation:

Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.

Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.

Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.

3 0
3 years ago
Other questions:
  • 6. When you don't have enough room to stop, you may _______ to avoid what's in front of you.
    14·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    8·1 answer
  • 9.6 Code Practice: Question 1
    9·1 answer
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • f the copyright date on the homepage is more than 1 year old, the website should always be considered unmaintained
    8·1 answer
  • True or False? Jerry's company is beginning a new project, and he has been assigned to find a telecommunications tool that will
    13·2 answers
  • Desktop is an example o f which data type
    7·1 answer
  • Most widely used insulator for splices of smaller wires
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!