1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
12

While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config

uration along with current network performance data. Which type of review are you most likely to perform
Computers and Technology
1 answer:
Sophie [7]3 years ago
6 0

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

You might be interested in
Elena is used to kissing her friends on both cheeks as a form of greeting in her native country. She notices that her new friend
Veseljchak [2.6K]

Answer:

c. Norms.

Explanation:

When Elena noticed her friend getting uncomfortable when she kisses him on the cheeks as a form of greeting she was violating his norms.

Norms are something that is standard or typical.

In USA there they not used to kiss on the cheeks to greet their friends there would be some other norm of greeting someone.

5 0
3 years ago
Answer the following questions for Web browser and Web server software: 1. What functions should this software application provi
timurjin [86]

Answer:

Explanation:

Functions should a software application provide to keep a web browser secured

1) The web browser should always be updated, so kindly keep the "automatic update" option enable on your browser settings so that whenever the browser gets an update, it will be updated automatically.

2) Always keep the third party cookies disabled because there are so many unauthorized and phishing sites over the internet they may lead the browser unsafe and cause very higher security risk so block all the third party sites and cookies from the browser

Functions should a software application prohibit to keep a web browser secured

1) Do not store passwords on your web browser, deny the "store password" option on your browser settings. Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

2) Do not click on unwanted, unknown hyperlinks. There will be many unsolicited attachments, PDFs, DOCs, files, etc over the internet so do not open or download it unnecessarily.

Functions should a software application provide to keep a web server secured

1) Always use an application scanner. Whenever you install or download any new applications do scan the application before accessing it.

2) Install all the security patches because there are more number of hackers over the internet so do not deny installing the security patcheds on time.  

Functions should a software application prohibit to keep a web server secured

1) When an application is not in use for long time, better uninstall it because they are actually of no use so do uninstall all the unwanted softwares or applications along with extensions.

2) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

5 0
3 years ago
5.
larisa86 [58]

Answer:

Explanation:

5 is correct answer

3 0
3 years ago
. :
Rudik [331]

Answer:

Yes.  I completely agree.

Explanation:

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

7 0
3 years ago
Look at the following code.int x = 7;int *iptr = &x;What will be displayed if you send the expression *iptr to cout ? What h
masha68 [24]

Answer:

The answer to the given question can be given as:

The value of *iptr is 7. and the value of iptr is dynamic.

Explanation:

In the c++ code, it is defined that x is an integer variable that assigns a value which is 7. Then we define a pointer variable that is *iptr. This variable holds an address of the x variable. When we print the value of the iptr variable. if we use the expression *iptr to print value of the pointer variable by cout that is used in c++ for pint values. so the value of the iptr is 7. If we use the expression iptr sent to cout so we show the address of the variable x. In the pointer, it manages the addresses of dynamically allocated so the address of the variable is changed on execution time.

4 0
3 years ago
Other questions:
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part (a number between 0
    8·1 answer
  • 10 10 105 Each process is assigned a numerical priority, with a higher number indicating a higher relative priority. In addition
    8·1 answer
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • You use worksheets to perform calculations. How do you perform these calculations?
    15·2 answers
  • Text that has equal left and right margins is said to be
    14·2 answers
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • Do you think LinkedIn stands to change the way employers hire? If so, how? Would this be a positive change or a negative one? Ex
    14·1 answer
  • There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!