answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
2 years ago
11

An attacker distributes hostile content on Internet-accessible Web sites that exploit unpatched and improperly secured client so

ftware running on victim machines. Which of the SANS Critical Security Controls is primarily affected
Computers and Technology
2 answers:
nignag [31]2 years ago
6 0

Answer:

Inventory of authorised and unauthorised devices

Explanation:

There are about 20 SANS critical security controls, one of which is the inventory of authorised and unauthorised devices.

This is understood to be the act of

to earnestly running and engaging all hardware devices present on the network to make sure that only authorized devices are given access to the network.

The moment the attacker distributed hostile content on Internet-accessible web sites, this means that foreign agents have been introduced to the network and these agents are there to act as spyware or malware on the network.

Inventory of authorised and unauthorised devices includes tracking of any unauthorized and unmanaged devices like the one illustrated above in order to prevent them from gaining access to the network.

julia-pushkina [17]2 years ago
5 0

Answer:

Since the attack impacts the client SANS Critical Security Controls. This act affects the Inventory of authorized and unauthorized software running on the victim's machine.

You might be interested in
NTDS Quotas store NT Directory Service quota information that limits the number of Active Directory objects a user, group, compu
Anna35 [415]

Answer:

The anwer is advanced feature folder

Explanation:

Because NTDS QUOTAS is an advanced feature folder that stores NTDS quota information that limits the number of Active Directory objects a user, group, computer, or service can create.

3 0
2 years ago
On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
VladimirAG [237]

In this activity Morgan is preparing the digital files to a printer  on a DTP project.

Explanation:

DTP project is the creation of documents using page layout on a personal computer. The process of printing digital based images directly to variety of media substrates is known as digital processing.

The digital files like PDFs can be sent directly to digital printing press to print on paper, photo paper, fabric and so on.

They have unique fade rates and different sensitives to the various deterioration mechanisms. DTP is used for graphic designers to create documents.

6 0
2 years ago
Read 2 more answers
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.
ELEN [110]

Answer:

D. is the correct answer!

8 0
2 years ago
Read 2 more answers
A type of printer is used to price model and shape is called
balandron [24]

Either a 3d,2d printer, or a price label gun

7 0
2 years ago
Convert the following binary number to octal (111000)2​
yKpoI14uk [10]

Answer: (111000)2 = (70)8

Step by step solution:

Step 1: Write down the binary number

   (111000)2

  Group all the digits in sets of three starting from the LSB (far right). Add zeros to the left of the last digit if there aren't enough digits to make a set of three.

   111 000

Step 2: Use the table below to convert each set of three into an octal digit. In this case,

 111=7, 000=0.

So, the number 111000 in binary is equivalent to 70 in octal.

To convert from binary to octal use the following table:

Bin:     000 001    010     011    100 101     110     111

Octal:     0         1        2         3       4       5       6       7

7 0
2 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • a. STOP: What is a technology habit you practice today that you now realize will not help you to be successful? Explain why it’s
    13·2 answers
  • Write a program that uses the function isPalindrome given in Example 6-6 (Palindrome). Test your program on the following string
    7·1 answer
  • Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and displays its area.
    15·1 answer
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Your company just bought a new subsidiary based in Des Moines, Iowa. Although your local operation already uses IPv6 for local n
    7·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • PYTHON CODE ONLY:
    7·1 answer
  • Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!