1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
14

While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic

h activity did Sarah perform
Computers and Technology
1 answer:
VladimirAG [237]3 years ago
8 0

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

You might be interested in
When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each inter
stiks02 [169]
1) <span>The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2) </span><span> Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
</span>3) <span>Knowing the link-local address is unique, it configures the interface to use
    that address
4) </span><span>The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) </span><span>The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) </span><span>By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it </span>
5 0
3 years ago
Why do we need to shutdown our computer unit before we clean and disassemble?
Len [333]
Silly question! Of course you have to shutdown because you can ruin some components. Also you can block the CPU fan, CPU is very hot like the computer internals.
3 0
4 years ago
Long answer questions.
EleoNora [17]

Answer:

  1. ans-I have outlined four types of communication, but I believe there are actually five types of communication: verbal, non-verbal, written, listening, and visual.
4 0
3 years ago
Vanessa has taken several courses in digital graphic design and now has an interview for an internship with a company that creat
salantis [7]

Answer:

portfolio

Explanation:

7 0
2 years ago
Identify two different uses/applications of data in which biases in word embeddings might cause significant ethical harms, then
olchik [2.2K]

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

  • Class immobility
  • Systemic racism

<h3>What are the biases in word embedding?</h3>

Word embeddings is known to be made up of a high level bias such as group stereotypes and prejudice.

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

Class immobility
  • Systemic racism

Learn more about biases from

brainly.com/question/24491228

#SPJ1

4 0
3 years ago
Other questions:
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • How do you represent (decimal) integer 50 in binary
    7·1 answer
  • What is the purpose of social networking sites
    14·1 answer
  • What is displayed in the alert dialog box after the following code is executed? var scores = [70, 20, 35, 15]; scores[scores.len
    8·1 answer
  • What is referred to by the phrase “Web 2.0”?
    11·1 answer
  • A client is currently struggling with late-stage integration and manual deployments. They want to find another method that will
    5·1 answer
  • Cuál es el objetivo principal de una clave primaria?
    14·1 answer
  • Use the factorial operation to evaluate 4!.<br><br> 24<br><br> 1<br><br> 4<br><br> 10
    10·1 answer
  • Team members can collaborate on ideas using telepresence. <br> true or false?
    10·1 answer
  • True or false windows 98 and windows xp are examples of an operating system?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!