1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
3 years ago
7

For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc

ture to help mitigate risk
Computers and Technology
1 answer:
Schach [20]3 years ago
6 0

Answer:

 a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.

b. Workstation Domain: Install anti-virus and constantly update the system software.

c. LAN Domain:  Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.

d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.

e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.

f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.

g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.

Explanation:

Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.

You might be interested in
All of the following items could be too expensive for someone with only a high school degree to afford except
Papessa [141]
This sounds like a multiple choice answer can I have 4 choices to pick?
7 0
3 years ago
Which activity represents a violation of the licensing agreement
kvasek [131]
Could you give the answers it gives you? It should be along the lines of purposeful destruction of equipment.
5 0
4 years ago
Read 2 more answers
What is virtual memory? What is the function of associative memory?
zheka24 [161]

Answer:

Virtual memory is a feature of an operating system that enables a computer to be able to compensate shortages of physical memory by transferring pages of data from random access memory to disk storage. ... This means that when RAM runs low, virtual memory can move data from it to a space called a paging file.

Associative memory is also known as content addressable memory (CAM) or associative storage or associative array. It is a special type of memory that is optimized for performing searches through data, as opposed to providing a simple direct access to the data based on the address.

3 0
3 years ago
The ________ contains the central electronic components of the computer. select one:
Sati [7]
The motherboard contains the central electronic components of the computer.
6 0
3 years ago
Explain The main distinction between an ap course and a dual enrollment course.
V125BC [204]

Answer:

Overall, the main difference between the courses is the fact that AP classes require an AP exam, while Dual Enrollment classes just require a passing grade. This causes colleges to favor AP classes because they know exactly what you learned based on what you knew on the AP exam.

5 0
4 years ago
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • From the Table Style Options area of the Design tab, you select Banded Columns. What will happen to your table?
    11·1 answer
  • Earthquakes happen in the Earth’s
    10·1 answer
  • Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
    9·1 answer
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • The worst "review platform" (e.g. TripAdvisor, Zomato, Yelp) that can't be trusted?
    14·1 answer
  • In a company you are in charge of system maintainance. Justify with 5 reasons why your role is key
    6·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • In a mobile phone network, how many times as strong would
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!