1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda3 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]3 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER
Anna11 [10]

Answer:

Evaluate and compare free and commercial versions of the antivirus software provided at the link above. Based on the information you learned in this Unit, what differences, if any, are significant enough to warrant considering paying for the software versus using the free version (for a typical home user, if the specific annual costs were not a major consideration)? What is “missing” from the personal/home/base level subscription that you might want?

Explanation:

4 0
2 years ago
A file name extension provides what information about a file?
ASHA 777 [7]
In a file extension, it tells what type of file it is and tells what compiler to run the code.
8 0
3 years ago
Read 2 more answers
All of these acts performed when doing an oil and filter change except ?
Nat2105 [25]
B. Loosening the drain plug with a screwdriver
6 0
3 years ago
Read 2 more answers
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
3 years ago
Which two components help input data in a computer and select options from the screen, respectively?
Natali [406]

Answer:

Mouse and Keyboard are the devices which can be used to give input to the computer.

Explanation:

Mouse and Keyboard both are connected with the CPU via USB cable. Mouse consists of 3 major buttons, left button(for click to get the task to be done), right button (to get options) and wheel (to scroll up and down the page on screen). Keyboard is use to type text and letters as per need.

3 0
3 years ago
Other questions:
  • Answer this question please
    6·1 answer
  • While inspecting an element in the DOM on my website using the Chrome Devtools I accidentally deleted the DIV that had all my au
    8·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
    7·1 answer
  • Some classes, like the ArrayList class, use angle brackets in their documentation and their declaration. For example, the Java d
    5·1 answer
  • Using a caesar cypher with an offset of three characters (a -> d, b ->e, ...., z -> c), what would be the correct cyphe
    6·1 answer
  • 4.2 lesson practice last one plzs help
    5·2 answers
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
  • When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?
    10·1 answer
  • ASSIGNMENT FORM 2 1. Evaluate the following without using mathematical tables 0.36 x 6(142 +58) 21.44 - 10.64​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!