answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
2 years ago
10

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Computers and Technology
2 answers:
steposvetlana [31]2 years ago
4 0

Answer:

Threat assessment

Explanation:

In an IT system, <em>threat assessment</em> is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

algol [13]2 years ago
3 0

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

You might be interested in
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
AveGali [126]

Answer:

subnets=65536

Explanation:

As we know that,

-->interface ID portion of address starts from 64

--> we have 48 network prefix

so

available bits for subnet are = 64-48=  16

so with 16 bit address we can create subnet = 2^16 = 65535

6 0
2 years ago
Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
NISA [10]

Answer:

#include <iostream>

using namespace std;

void CoordTransform(int *ptr1, int *ptr2);

int main()

{

   int xVal;

int yVal;

cout<<"please enter two valid integers";

cin>>xVal;

cin>>yVal;

CoordTransform(&xVal , &yVal);

int xValNew=xVal;

int yValNew=yVal;

cout<<xValNew<<yValNew;

   

   return 0;

}

void CoordTransform(int *ptr1, int *ptr2)

{

int a = *ptr1;

*ptr1=(*ptr1+1)*2;

*ptr2=(*ptr2+1)*2;

}

Explanation:

It will return new values in previously defined variables

coding language: c++

3 0
2 years ago
Read 2 more answers
Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the s
Mila [183]

Answer:

D) Comparative

Explanation:

Comparative report is an analytical approach to report writing, where the aim is to determine the performance or contribution of individual constituents.

6 0
2 years ago
A customer wants to increase his storage capacity by 25gb
Tom [10]

The answer is "SSD-25GB", and its further calculation can be defined as follows:

  • The <u><em>current generation of computer storage devices</em></u> is a hard drive (SSD).
  • It uses a flash memory that is substantially faster than a conventional mechanical disc.
  • The user does not require Storage or GPU, Video Card cannot be used.
  • RAM is a memory volatile that cannot be utilized as storage media.
  • SSD is better than magnetic HDD in terms of speed and performance.
  • SSD has become substantially quicker than USB 3.0.

That's why the answer is "SSD-25GB".

Learn more:

brainly.com/question/14411313

7 0
1 year ago
To finish creating a design for the webpage, use one shape to cut away part of the other. Create a 700 pixel by 700 pixel square
Flauer [41]

Answer:

Explanation:

1. select the rectangle 1 layer and then select the rectangle tool in the left tool bar

2. in the option bar along the top of the UI, select the path operations drop-down and choose subtract front shape.

3. click anywhere on the thin, white rectangle shape on the left side of the document

4. in the create rectangle dialog box, type 700 px for the height and 700 px for the width.

5. click the checkbox that says from center to ensdure the new shape is created from the center of the rectangle 6. click ok

6 0
2 years ago
Other questions:
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    14·1 answer
  • your monthly living expenses are $1500 on an income of $1,650 per month. your goal is to have an emergency fund of 4 times your
    5·1 answer
  • Write c++ program bmi.cpp that asks the user bmi.cpp the weight (in kilograms) and height (in meters).
    12·1 answer
  • Which of the following is NOT a benefit of virtual memory? speed up of process creation increases in the effective access time o
    6·1 answer
  • When employees have multiple concurrent connections, what might be happening to the VPN system?
    7·1 answer
  • In evaluating the precedence rules used by Python, what statement is accurate? a. Addition and subtraction are evaluated after a
    8·2 answers
  • Using basic programming (for loops, while loops, and if statements), write two MATLAB functions, both taking as input:
    6·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • "In about 100 words, discuss the technologies that Walmart’s trucking fleet might use to better manage their operations. Include
    7·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!