1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
15

How to delete nonsense answers to questions I added? please help

Computers and Technology
1 answer:
DiKsa [7]3 years ago
5 0

in order to delete answers from your questions, you have to rate them one star , or at least that's what I do, and then report it and then brainly will determine if it's something that needs to be taken down or not

You might be interested in
When replacing a thermostat or water pump, coolant drained from the cooling system should be ________.
Alchen [17]

Answer:

Explanation:

Disposed of in a contained way/recycled.

5 0
3 years ago
Which is an advantage of programming with a procedural language?
mestny [16]
What are the choices

3 0
3 years ago
Read 2 more answers
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Pseudoscience is
madreJ [45]
C is going to be your answer 
6 0
3 years ago
Read 2 more answers
Other questions:
  • The front surface of the CCD is called the _________
    11·1 answer
  • Programa en C
    9·1 answer
  • What do vector handles point at?
    13·2 answers
  • "Once a business operations analysis is completed and change needs to
    7·2 answers
  • Assume that we have an application with a total of 500,000 instructions where 20% of them are the load/store instructions with a
    14·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • In the table below, identify the data type that would be most suitable for the second field.
    10·2 answers
  • it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
    8·2 answers
  • What economic impact will this disaster have on people? Select three options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!