1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
2 years ago
7

A regional transportation and logistics company recently hired its first ChiefInformation Security Officer (CISO). The CISO’s fi

rst project after onboardinginvolved performing a vulnerability assessment against the company’s publicfacing network. The completed scan found a legacy collaboration platformapplication with a critically rated vulnerability. While discussing this issue with theline of business, the CISO learns the vulnerable application cannot be updatedwithout the company incurring significant losses due to downtime or newsoftware purchases.
Required:
What BEST addresses these concerns?
Computers and Technology
1 answer:
Alja [10]2 years ago
5 0

There are different ways to create solutions to problem. What Best addresses these concerns is that;

  • The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

<h3>How do firms use a WAF to protect their applications? </h3>
  • A WAF is known to be often used by firms to protects their web apps through the use of filtering, monitoring, and hindering (blocking)any forms of malicious HTTP/S traffic moving to the web application.

They often prevents any unauthorized data from leaving the app. This WF will be a useful approach to addresses these concerns in the above scenario.

See options below

Which of the following BEST addresses these concerns?

A. The company should plan future maintenance windows such legacy application can be updated as needed.

B. The CISO must accept the risk of the legacy application, as the cost of replacing the application greatly exceeds the risk to the company.

C. The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

D. The company should build a parallel system and perform a cutover from the old application to the new application, with less downtime than an upgrade.

Learn more about vulnerability assessment from

brainly.com/question/25633298

You might be interested in
Write an application that instantiates five Recording objects and prompts the user for values for the data fields. Then prompt t
tangare [24]

Answer:

Here is the JAVA application

Recording.java:

class Recording {  //class name

String title;  //String type variable to store the title of the song

String artist;  //String type variable to store the artist name of the song

int playingTime;  //int type variable to store the playing time of the song in seconds  

public String getTitle() {  //accessor method to get the title of the song

   return title; }   //returns the current title of song

public void setTitle(String title) {  //mutator method to set the title of song

   this.title = title;  }   // sets the title of song

public String getArtist() {  //accessor method to get the artist name of the song

  return artist; }   //returns the current artist name of song

public void setArtist(String artist) {  //mutator method to set the artist name of song

  this.artist = artist; }   //sets the artist name

public int getPlayingTime() {  //accessor method to get the playing time of the song

   return playingTime; } /  /returns the playing time of song

public void setPlayingTime(int pt) {  //mutator method to set the playing time of song

   this.playingTime = pt; }   //sets the playing time of song

public Recording(String title, String artist, int playingTime) {  //parmeterized constructor of Recording class that takes title, artist and playingTime as parameters

this.title = title;  

this.artist = artist;

this.playingTime = playingTime;  }  }

Explanation:

Here is the Main class:  

import java.util.Scanner;   //to accept input from user

public class Main {  

public static void main(String[] args) {  // start of main function

 Recording[] song = new Recording[5];  //creates object of Recording class named song to instantiate five Recording objects

 Scanner input = new Scanner(System.in);  //creates Scanner class object named input

 int i = 0;  // declare i and initialize it to -

 for (i = 0; i < song.length; i++) {  //iterates through the list of song

  int j = i + 1;  

  System.out.print("Enter the title of song " + j + ": ");  //prompts user to enter the title of song

 String title = input.nextLine();   //reads the title string from user

 System.out.print("Enter the artist of song " + j + ": ");  //prompts user to enter the artist of song

 String artist = input.nextLine();   //reads the artist string from user

System.out.print("Enter the playing time of song " + j + " in seconds: ");   //prompts user to enter the playing time of song

 String playtime = input.nextLine();  //reads the playing time string value from user

 int playingTime = Integer.parseInt(playtime);   // converts String value of playtime to integer

 song[i] = new Recording(title, artist, playingTime); }   //calls constructor of Recording class by passing title, artist and playingTime to it  

 int sort;  // for choosing which field to sort

do {  //continues to ask user to enter which field the Recordings should be sorted by

System.out.println("How should these songs be sorted? 1 for title 2 for artist 3 for playing time");  

sort = input.nextInt();  //reads user choice to sort

       if (sort > 0 && sort < 4) {  //to check if user enters a valid choice

 int a, b;  

 int max = song.length - 1;  

for (a = 0; a < max; a++) {  //iterates through the length of the song list setting an index variable a

      for (b = 0; b < max; b++) {    //iterates through the length of the song list setting an index variable b

  int c = b + 1;

     if (sort == 1) {  //if the user selects title field

       if (song[b].getTitle().compareTo(song[c].getTitle()) > 0) {  // compares title of one song with the song that comes after it

   Recording temp = song[b];  //sorts the titles using bubble sort by ordering each title to the immediate next and swapping them if they are not sorted already

   song[b] = song[c];

   song[c] = temp; } }  

   else if (sort == 2) {    //if the user selects artist field

  if (song[b].getArtist().compareTo(song[c].getArtist()) > 0) {  // compares artist of one song with the song artist  that comes after it

//sorts the artists using bubble sort by ordering each title to the immediate next and swapping them if they are not sorted already

     Recording temp = song[b];

     song[b] = song[c];

     song[c] = temp;  }  }  

   else if (sort == 3) {   //if the user selects playing time field

  if (song[b].getPlayingTime() > song[c].getPlayingTime()) {

/* compares artist of one song with the song artist  that comes after it sorts the artists using bubble sort by ordering each title to the immediate next and swapping them if they are not sorted already */

       Recording temp = song[b];

        song[b] = song[c];

         song[c] = temp;  } } } }  }  

             else {  //if user enters any invalid choice

 System.out.println("Invalid choice! Enter right choice"); }        

       } while (sort < 1 || sort > 3);  //keeps asking user to enter which field the recording to sort by until the value of sort in range of 1 to 3

for (i = 0; i < song.length; i++) {  //displays the sorted song list according to selected field

System.out.println("Song: Title: " + song[i].getTitle() + ". Artist: " + song[i].getArtist() + ". Playing time: " + song[i].getPlayingTime() + " seconds.");  }

input.close();  }  }

The output of the program is attached.

7 0
3 years ago
1. True or false: The more pixels per inch in an image, the higher the resolution is. (1 point)
Annette [7]
1. true
2. pixel
3. raster images are built with pixels
4. false
5. image size
6. rollover
7. sharp with clear details
8. 78px
9. 24in
10. scalability
3 0
3 years ago
The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
kondaur [170]

The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a cluster of processors is known as <u>parallel computing.</u>

<u></u>

<h3>What is Parallel Computing?</h3>

Parallel computing refers to the process of breaking down larger problems into smaller, independent, often similar parts that can be executed simultaneously by multiple processors communicating via shared memory, the results of which are combined upon completion as part of an overall algorithm. The primary goal of parallel computing is to increase available computation power for faster application processing and problem solving.

<h3>Types of parallel computing</h3>

There are generally four types of parallel computing, available from both proprietary and open source parallel computing vendors:

  • Bit-level parallelism: increases processor word size, which reduces the quantity of instructions the processor must execute in order to perform an operation on variables greater than the length of the word.
  • Instruction-level parallelism: the hardware approach works upon dynamic parallelism, in which the processor decides at run-time which instructions to execute in parallel; the software approach works upon static parallelism, in which the compiler decides which instructions to execute in parallel.
  • Task parallelism: a form of parallelization of computer code across multiple processors that runs several different tasks at the same time on the same data.
  • Superword-level parallelism: a vectorization technique that can exploit parallelism of inline code.

Learn more about parallel computing

brainly.com/question/13266117

#SPJ4

5 0
2 years ago
The set of instructions that tell the computer what to do are called ____.
CaHeK987 [17]
Hi,

The word you are looking for is "programs".

Hope this helps.
r3t40
4 0
3 years ago
Read 2 more answers
Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management
Elis [28]

Answer:

Resources

Explanation:

Carlie certainly requires to review the resources. It is important to find out how many software engineers, testers, etc. are available. And only then Carlie can find out the exact deadlines as required here. And hence, she must have look at the resources while determining the specific deadlines. Hence, resources are the correct option.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What file would you edit to restrict the number of simultaneous logins a user can employ??
    14·1 answer
  • Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highe
    6·1 answer
  • The __________ assumption necessary for a linear programming model to be appropriate means that the contribution to the objectiv
    6·1 answer
  • Given the following sequence of integers: 12, 19, 10, 4, 23, 7, 45, 8, 15 Build a heap by inserting the above set, one integer a
    8·1 answer
  • Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the intern
    12·1 answer
  • Jason Has A Science Video Project, As He Creats His Project, He Saves, Then Comes Back A Minute Later. The File Is Now Unreadabl
    8·2 answers
  • Write a method body for the static method isDivisibleBy5 shown below. The only NaturalNumber methods you are allowed to use are
    12·1 answer
  • Alan has introduced a new line of scooters on his website and is using a Google Display Ad campaign to promote them. He selects
    8·1 answer
  • Abby wants to simply share a snapshot of her calendar with another user. Which option should she choose to achieve
    15·1 answer
  • What are some common uses of Excel?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!