1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
6

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the

host reboots or the us
Computers and Technology
1 answer:
joja [24]3 years ago
8 0

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

You might be interested in
Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
makkiz [27]

Answer:

Confidentiality and availability- interruption, integrity - modification and fabrication.

Explanation:

Data on a network is provided with the three As in security, accountability, authentication and authorisation to promote the confidentiality and integrity of data on the network.

When a data is interrupted by a DOS attack, it is exposed to the attackers and the data transfer is interrupted. With this, the attacker can modify the existing data or fabricate a new data to sent to the network, crippling the integrity of the network data.

4 0
3 years ago
Which of these are correctly formatted python dictionaries? Check all that apply.
Pachacha [2.7K]

Answer:

A and D sorry if i get it wrong.

Explanation:

8 0
3 years ago
Read 2 more answers
A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
zvonat [6]

Answer:

log off the web page would be the best answer here or explaining why trolling is rude but log off the web page is the best one here

5 0
3 years ago
Read 2 more answers
Which communication technology often takes the place of printed interoffice communication?.
Alexeev081 [22]

Answer:

E-mail

Explanation:

5 0
1 year ago
Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
Fiesta28 [93]

Answer:

import java.util.Scanner;

public class num2 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int count =0;

       int total = 0;

       System.out.println("Enter the numbers");

       int num = in.nextInt();

       while(num!=-1){

           total = total+num;

           count++;

           System.out.println("Enter the next number");

           num = in.nextInt();

       }

//Compute the average

       double average = (double) total/count;

//Outputs

       System.out.println("Total count of numbers entered "+(count));

       System.out.println("Sum of the numbers "+total);

       System.out.printf("Average is %.2f ",average);

   }

}

Explanation:

  • Using java programming language
  • Import scanner class to receive user input
  • declare variables count and total and initialize to zero
  • Prompt user to enter numbers
  • Use a while statement with the condition while(num!=-1)
  • Within the while body keep prompting user to enter a number, increase count and update total
  • when -1 is entered the loop breaks and average is calculated
  • Use printf() method to print average to 2 decimal places.
5 0
3 years ago
Other questions:
  • Isp servers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the
    6·1 answer
  • :3 Brainlsit included! =) 33 points!
    10·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • What term best describes when the scope of the project changes from what was initially agreed upon?
    8·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • PLZ HELP!! How does HTML help solve the problem of telling a computer what a web page looks like, not just the content that is o
    15·1 answer
  • Which measurement symbol is this?<br>PLS HELP<br>​
    14·1 answer
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!