1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
13

Multi-part question:

Computers and Technology
1 answer:
STatiana [176]3 years ago
8 0

Answer:

part 1:

Explanation:

You might be interested in
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
This assignment involves writing a program that models a dog. A dog has a name, a breed (which may be unknown), a gender (male o
Vinil7 [7]

Answer:

This is very complex for our users please shorten this question. Thank You

Explanation:

3 0
4 years ago
When a dynamic array with a class for a base type is declared, which constructor is called?
kati45 [8]
The default constructor is called for each element of the array. So if you declare an array with 100 elements (object instantiations), the constructor is executed 100 times!
5 0
3 years ago
The syntax for ________ requires you to use a colon after every if statement and while loop.
Mamont248 [21]
Don't go yo the link
6 0
3 years ago
Print numbers 2 to 10 in increments of two.​
Sedaia [141]
In increments of two it should be 2,4,6,8,10
7 0
3 years ago
Other questions:
  • Practice Home Survey
    14·1 answer
  • Look at the following list of peripheral items and determine what type they are: mouse, keyboard, webcam, microphone. Input Outp
    15·1 answer
  • Calculator Create a program that calculates three options for an appropriate tip to leave after a meal at a restaurant.
    11·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • What are some particular game ideas for a Roblox developer. *Ideas that weren't copied or done before (simulators, tycoons, you
    13·2 answers
  • What is a piece of information sent to a function
    15·1 answer
  • Methods are used to define an object's behavior. True False
    8·1 answer
  • Explain the importance of system software in the computer​
    8·1 answer
  • Holi alguien sabe como cambiar el gamertag en XBox App (para iOS)?
    9·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!