1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
9

Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following

precautions: All the computers are patched, have antivirus software, and have unneeded services shut down. The network has a firewall with proxy server and IDS. The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days. Has Juan done enough to secure the network
Computers and Technology
1 answer:
Lesechka [4]3 years ago
4 0

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.

You might be interested in
Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
Verdich [7]

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

8 0
3 years ago
A wide variety of "apps" are available to customize devices. Which category of app does word processing software fall into? Ente
kkurt [141]
 word processing falls into the productivity education application.
6 0
3 years ago
Identify two entities and 2 of their attributes from the given scenario.
polet [3.4K]

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
8 0
3 years ago
Is(are) input value(s) to use with a program to test the accuracy of the output.
Law Incorporation [45]

Answer:

test cases

Explanation:

5 0
2 years ago
Read 2 more answers
ImmuneEarth, a research and development company, has "eradicate all diseases" as its motto. It has numerous departments that res
anastassius [24]

Answer:

Grid computing.

Explanation:

Grid computing is a study utilizing Immune Earth to test AIDS treatment because the following are the reasons that describe the answer is true about the scenario.

  • Grid computing seems to be a scattered network with a vast amount for systems linked to handle a difficult issue.
  • Systems can be linked straightly or through organized systems.

Other options are incorrect.

  • Green computing is not the correct answer according to the scenario because the usage of systems and its energy is socially safe and economically sustainable.
  • Trusted Computing is not the correct answer according to the scenario because it helps a part of information to show which os as well as program to be required to access this.
  • Edge computing is not the correct answer according to the scenario because it optimizes web apps as well as software programs while getting computation back to the information base.
4 0
3 years ago
Other questions:
  • How to write "There are four parking spots on campus that may be used only by Nobel Prize winning faculty." this sentence correc
    12·1 answer
  • What is the process of comparing data with a set of rules or values to find out if the data is correct?
    8·2 answers
  • TWO MINUTES LEFT<br> ________ __________ is the physical arrangement of devices on a network.
    9·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
  • PLEASE HELP I HAVE A TEST RIGHT NOW!!!
    13·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • Difference between a port and a connector
    10·1 answer
  • Please choose odd one out please tell fast​
    12·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!