1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
14

While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic

h activity did Sarah perform
Computers and Technology
1 answer:
VladimirAG [237]3 years ago
8 0

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

You might be interested in
What is virtualization?
anzhelika [568]

Answer:

Virtualization refers to the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

Explanation:

I hope this was what you were looking for

3 0
3 years ago
Read 2 more answers
A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v
Reptile [31]

Answer:

Option A (Domain reputation) and Option C (URL redirections) is the correct answer.

Explanation:

<u>Domain reputation</u>:

  • Receipts examine how almost every communication uses one's domain as well as how the communication or transaction will finish up throughout the box.

<u>URL redirections</u>:

  • A component of webhosting that transfers a consumer across one towards the very next URL. Redirects are usually typically self-directed redirect which always utilizes several of the hypertext protocol's set Site Observations.

Other options are not related to the given scenario. So the above two are the correct ones.

6 0
3 years ago
How to contact list different from an address book
lisabon 2012 [21]

A contact list is different from an address book because your constancy list consist of people whom you know and choose to communicate with, while the address book gives you a list of the community’s residents phone numbers.



8 0
3 years ago
Read 2 more answers
“If the information ______________________, then that information (should / should not) be stored because _____________. For exa
lisov135 [29]

The blanks spaces are filled with the following;

  1. Is confidential, should not
  2. There's risk of information theft on the cloud
  3. Social security number, should not

<h3>Confidential information and the storage cloud</h3>

According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.

This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."

Read more on information storage;

brainly.com/question/24688176

5 0
3 years ago
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions
docker41 [41]

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

7 0
3 years ago
Read 2 more answers
Other questions:
  • When you use the Bing Image Search for online pictures, you will be searching the Internet for pictures that have been filtered
    13·2 answers
  • What term is used to describe the harassment of computer users through various forms of internet communications?
    5·1 answer
  • Items in the __________ area of a class are accessible to all entities that can "see" the object(s) of that class type
    10·1 answer
  • How do you activate caps lock on chromebook
    10·2 answers
  • At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
    12·1 answer
  • Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
    10·1 answer
  • Which of the following are provided by most professional organizations
    11·1 answer
  • If a touch screen chrome is not charging what is wrong with it
    13·2 answers
  • Wassup anybody tryna play 2k
    6·2 answers
  • How am I supposed to delete my Brainly account if I don't know my password and my E-mail is made up?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!