TEETEE TEE TEE TEE TEETEETEE
Answer:
A targeted local disclosed ping flood targets a single computer on a local network. An attacker needs to have physical access to the computer in order to flood your network
Explanation:
Answer:
A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.
Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.
Some security models one can select from are:
- ISO 27000 Series (International Organization for Standardization)
- ITIL (Information Technology Infrastructure Library)
- NIST (National Institute of Standards and Technology) and
- COBIT (Control Objectives for Information and Related Technology)
Some of the interesting components of the security management model that can be adapted for use in the SMM are:
- Identification of the Impact of a security breach on the business;
- determine preventive measures and
- developing recovery strategies
Cheers!
Answer:
resizing
Explanation:
put in middle and go down
Answer:
A. Create a profile that has permissions to the VIP information and assign it to the VIP community users.
Explanation:
Salesforce is a customer rapport management platform that is based on the cloud. There are program applications for sales, marketing and services. The platforms are utilized to achieve an enhanced relationship with customers because they have a better understanding the need of their customers and how to solve their problems by organization and managing their customers' information and interactions.
VIP users will get access to the information they want when there are permissions set for the VIP users. VIP information will be given to the VIP customers in order for them to carry out activities that they need to do to execute their job.