1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
3 years ago
14

A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web

servers hosting the company’s client-facing portal are running slowly today. After some investigation, the security engineer notices a large number of attempts at enumerating host information via SNMP from multiple IP addresses. Which of the following would be the BEST technique for the security engineer to employ in an attempt to prevent reconnaissance activity?
A. Install a HIPS on the web servers
B. Disable inbound traffic from offending sources
C. Disable SNMP on the web servers
D. Install anti-DDoS protection in the DMZ
Computers and Technology
1 answer:
Virty [35]3 years ago
6 0

Answer:

The correct answer to the following question is option A). Install a HIPS on the web servers

Explanation:

HIPS stands for Host-Based Intrusion Prevention System or Host Prevention System.

HIPS is the program or system which protects your computer system against virus and the other malware and it also protects from unknown and known malicious attacks.

You might be interested in
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it
oksian1 [2.3K]

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
8 0
3 years ago
Assume the int variables i, lo, hi, and result have been declared and that lo and hi have been initialized. Write a for loop tha
IRISSAK [1]

Answer:

result=0;

for (i=lo ; i<=hi; i++){

result += i;

}

Explanation:

The question says result was declared but not initialized, so using result without initializing it to 0 would throw an error as result would be undefined and you can't add a number to undefined

Another way to do it to keep everything inside the loop would be

for (i=lo ; i<=hi; i++){

if (i==lo) result= 0;

result += i;

}

but this is impractical since it would add unnecesary operations in each cycle of the loop

4 0
3 years ago
Why is group design better or worse for coding projects ?....will report for a dum answer U ` U
DedPeter [7]

there are many styles of coding think about it like art if you had 15 painters working on the same 4x4 painting it would look like a mess.

-scav

8 0
3 years ago
Which of the following is not a property of a constructor?A. The name of a constructor can be chosen by the programmerB. A const
inna [77]

Answer:

The answer is "Option A"

Explanation:

The constructor is a special member function whose task is to initialize an object from its class, and it doesn't return any value like int, float, double, etc. Its name and class name will always be the same, and when we create the class object so, the constructor is automatically called, and it may be overloaded, that's why we can say that except the "choice A", all were correct.

4 0
3 years ago
Other questions:
  • Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
    5·1 answer
  • 1. Jesse wants a recommendation about creating an SCR help desk. She said that I can find lots of information about help desks o
    7·1 answer
  • John's Plumbing prides itself on excellent customer service, especially during after-hours service calls. They want to connect w
    11·1 answer
  • Indenting the start and finish of segments
    8·2 answers
  • Modify the code below to do the following:
    12·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • Why bootable installer preparation is important? explain
    9·1 answer
  • What is the binary for O?​
    5·2 answers
  • Would you consider upgrading Maxine’s wardrobe a need or a want?
    11·1 answer
  • you are asked to create a four-digit code using the numbers from 1 to 9. how many possible codes are there--assuming that number
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!