1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
2 years ago
14

While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic

h activity did Sarah perform
Computers and Technology
1 answer:
VladimirAG [237]2 years ago
8 0

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

You might be interested in
Design the logic for a program that allows a usher to continuously enter numbers until the usher enters 0. Display the sum of th
uysha [10]

int sum = 0, n;

do {cin>>n; sum+=n;}while (n!=0);

cout<<sum;

5 0
3 years ago
How to cheat on asseeprep
Burka [1]
Just do it just look up the answers mate
6 0
2 years ago
) What is the ""Phantom Inspector""? (
matrenka [14]

Answer:

 Phantom inspection is the process of finding various defects in the documents according to the . Basically, it is a group of meeting that usually provide the synergy effects and the maximum defects can easily be detected. This entire process is known as phantom inspector.  

It is also made some assumptions regarding the inspection that is made by one and more than one individual.

This process are usually done by inspecting the each operation output with the given output requirements.

4 0
2 years ago
EXERCISE
nirvana33 [79]

Answer:

1. True

2. True

3. False

4. True

5. True

8 0
1 year ago
Which of the following keys on a keyboard allows you to select multiple cells located in different parts of your worksheet?
MrMuchimi
<span>Hold down the Ctrl key as you click the cells you would like to select.</span>
5 0
2 years ago
Read 2 more answers
Other questions:
  • Although the original BBS system was simple, it increased people's ability to communicate
    14·1 answer
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    5·1 answer
  • The cost of large ground based telescopes has remained the same since the 1800's costing the equivalent of about a billion dolla
    9·1 answer
  • This is question 2.5 Computer Science and I don't understand what is wrong<br><br>​
    15·1 answer
  • To hide gridline when you display or print a worksheet
    14·1 answer
  • Tom is the aerobics coordinator at a fitness center. He needs a more efficient way for his instructors to share information. Cla
    13·2 answers
  • Which of these networks is primarily for posting and viewing photos?
    8·2 answers
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!