1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
2 years ago
7

A regional transportation and logistics company recently hired its first ChiefInformation Security Officer (CISO). The CISO’s fi

rst project after onboardinginvolved performing a vulnerability assessment against the company’s publicfacing network. The completed scan found a legacy collaboration platformapplication with a critically rated vulnerability. While discussing this issue with theline of business, the CISO learns the vulnerable application cannot be updatedwithout the company incurring significant losses due to downtime or newsoftware purchases.
Required:
What BEST addresses these concerns?
Computers and Technology
1 answer:
Alja [10]2 years ago
5 0

There are different ways to create solutions to problem. What Best addresses these concerns is that;

  • The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

<h3>How do firms use a WAF to protect their applications? </h3>
  • A WAF is known to be often used by firms to protects their web apps through the use of filtering, monitoring, and hindering (blocking)any forms of malicious HTTP/S traffic moving to the web application.

They often prevents any unauthorized data from leaving the app. This WF will be a useful approach to addresses these concerns in the above scenario.

See options below

Which of the following BEST addresses these concerns?

A. The company should plan future maintenance windows such legacy application can be updated as needed.

B. The CISO must accept the risk of the legacy application, as the cost of replacing the application greatly exceeds the risk to the company.

C. The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

D. The company should build a parallel system and perform a cutover from the old application to the new application, with less downtime than an upgrade.

Learn more about vulnerability assessment from

brainly.com/question/25633298

You might be interested in
_____ refers to the programs that a device can run.
Mars2501 [29]

Answer:

I think that C is the correct answer

Explanation:

<h2><em><u>PLEASE MARK</u></em><em><u> </u></em><em><u>ME BRAINLIEST</u></em><em><u> </u></em><em><u>IF MY</u></em><em><u> </u></em><em><u>ANSWER IS</u></em><em><u> </u></em><em><u>CORRECT PLEASE</u></em><em><u> </u></em></h2>
4 0
2 years ago
What is it called to persist in trying to multitask can result in this; the scattering bits of one’s attention among a number of
lozanna [386]

Answer: <em><u>is Option B</u></em>.

B<u>)</u>. <u>Multi tasking</u>:   A person capability to carry out more than one task at the same time is called multitasking. Person performing more than one task at the same time is nearly impossible and it's hard for him to focus on each and every detail, thus leading to scatter attention among numbers of things at a time resulting in inaccuracy and greater numbers of fault in final result.

<u>Explanation of other points:</u>

<u></u>

A<u>)</u>. <u>Attention:</u> is defined as performing tasks with special care and concentration.

C<u>)</u>. <u>Continuous partial attention:</u>  Under this category people perform tasks by concentrating on different sources to fetch information by only considering the most valid information among all information. people who use this technique to gather information works superficially concentrating on the relevant information out of numerous sources in a short period of thinking process.

7 0
3 years ago
Write in language C, please.
IgorLugansk [536]

Answer:

i don't get the question

Explanation:

7 0
3 years ago
Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
maw [93]

Answer:

Explanation below

Explanation:

Network organisations are those that is of a legal entity or independent company or a subsidiary business unit. These organisations can be an internal business unit acting as separate profit centres or a stable company that has outsourced its work.

Synthesis:

According to the articles "The top 3 network management challenges" and also "Problem Management in the Networking Environment" is that managerial issues like the problem diagnosis method itself can engage various stakeholders whose deeds need to be coordinated as well as tracked to confirm that the cost of study itself does turn into an issue along with that resolutions to problems are really discovered. An association expects its network to be  reliable, secure, flexible, expandable and cost-effective.

Relation:

Network security has had to adapt increasingly quickly, in order to keep up with the new ways that users and back-end systems work. Networks are growing not just in complexity, but also in size. As more and more functions converge onto data networks, the number of devices attached to the network grows, and therefore the number of switching and routing nodes in the network must also grow.Organizations need to attach more and more of their operations onto the data network – remote locations need connections into central sites; even locations with no staff need network links for surveillance cameras and/or environmental monitoring, and/or control of automated devices. An effective problem management is needed to handle the issues.

An effective problem management requires the integration of a number of different process groups and the ability to effect change in both the infrastructure and organizational behavior. Implementing a problem management strategy that achieves these goals needs careful planning and long-term commitment. Using external supplier relationships to make sure that the support required for both identifying problems and supporting the resolution is in place is also an integral part of the overall solution.

References: http://www.analytictech.com/mb021/virtual.htm

https://www.accyotta.com/assets/uploads/docs/Allied_-_AMF.pdf

7 0
4 years ago
What is created for each user the first time the user logs onto windows?
Naddik [55]
<span>A profile is made the first occasion when that a client sign on to a Windows XP, Windows 2000, or Windows NT® Workstation–based PC. A client profile is a gathering of settings and documents that characterizes the condition that the framework loads when a client sign on. It incorporates all the client arrangement settings, for example, program things, screen hues, organize associations, printer associations, mouse settings, and window size and position. Profiles are not client arrangements and the client has a profile regardless of the possibility that you don't utilize Group Policy.</span>
4 0
3 years ago
Other questions:
  • Which of these symbols is a special character that is accessible only from the Symbol dialog box? A. © B. + C. é D.
    13·2 answers
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    14·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • An example of creative curating is when a:
    9·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • Strengths and weaknesses about esport
    10·1 answer
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!