1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
2 years ago
7

For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc

ture to help mitigate risk
Computers and Technology
1 answer:
Schach [20]2 years ago
6 0

Answer:

 a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.

b. Workstation Domain: Install anti-virus and constantly update the system software.

c. LAN Domain:  Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.

d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.

e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.

f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.

g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.

Explanation:

Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.

You might be interested in
Select the correct answer
VMariaS [17]

Answer:

Digital pen

Explanation:

It is digital pen because it is basically a pen for electronics which you can write your signature with it.

5 0
3 years ago
Read 2 more answers
Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
andrezito [222]

Answer:

The correct answer is d) All of these are correct.

Explanation:

ETL stands for Extract, Transform and Load. An ETL system extracts data from the sources, enforces data quality and consistency standards, conforms data so that separated and maybe unrelated sources can be used together, and as a final step delivers data in presentation-ready formats so that developers can build applications and end users can take decisions.

4 0
3 years ago
A database is used instead of a spreadsheet when?
Luba_88 [7]
Lists involve date with multiple themes. 
5 0
3 years ago
When the increment or decrement operator is placed before the operand (or to the operand's left), the operator is being used in
Salsk061 [2.6K]

When the increment or decrement operator is placed before the operand (or to the operand's left), the operator is being used in prefix mode. Postfix mode on the other hand is when the increment or decrement operator is placed after the operand (or to the oper and's right) .


8 0
3 years ago
Briefly list four of the basic I/O interface standard? ​
tiny-mole [99]

Four of the basic I/O interface standard are PCI, SCSI, USB and ISA.

<h3>Standard I/O Interface</h3>

Input-Output Interface is used as an method which helps in transferring of information between the internal storage devices. A number of standards have been developed for I/O Interface.

There widely used bus standards are:

  • PCI (Peripheral Component Interconnect)
  • SCSI (Small Computer System Interface), and
  • USB (Universal Serial Bus).
  • ISA (Industry Standard Architecture)

Find out more on Standard I/O Interface at: brainly.com/question/24347579

4 0
2 years ago
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • When a browser makes a request for a static web page, the web server a. finds the HTML for the page and renders it b. renders th
    11·1 answer
  • One of the original forms of viruses, is usually stored on some form of removable media. When the removable media is connected t
    9·1 answer
  • What is connectivism and how does it apply to online learning?
    7·1 answer
  • I can't wait until school ends
    9·2 answers
  • F a domain consists of dcs that are running verions of windows server earlier than windows server 2008, what replication method
    10·1 answer
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • Please solve this in JAVA<br><br> Please see the attachment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!