You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What should you do

Answers

Answer 1

Answer:

deploy a NIDS

Explanation:

The best thing to do in this scenario would be to deploy a NIDS which stands for network intrusion detection system. This system basically warns you when it detects any harmful data trying to bypass the perimeter network in which it has been deployed. This also refers to any form of cyber attack such as malware, DoS attacks, spyware, etc. Anything that may cause any damage or perform unwanted actions on the system are detected and raises an alarm.


Related Questions

Which of the statements below is true about the Windows OS?
-The Start menu is located in the top right comer.
-You can access Help files from the Start menu.
-The Web browser icon is usually found in the Quick Launch area.
-The Show Desktop icon will minimize all open windows
O Clicking on the X in the upper right corner of a window will close the window

Answers

Answer:

1. false

2. true

3. true

4. false

5. true

Explanation:

A user can access help files from the Start menu, the Web browser icon is typically located in the Quick Launch area, and clicking the X in the upper-right corner of a window will close it are all true statements about the Windows operating system.

What is the Windows OS?

Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).

Microsoft created and distributes a number of proprietary graphical operating system families under the name Windows. With Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems, each family targets a certain area of the computer industry.

Therefore, the statements A and D are false.

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ2

What would be the best phrase to place in the blank
center circle?
O Attributes of a struggling student
O Attributes of a highly motivated student
O Attributes of an overwhelmed student
O Attributes of a highly frustrated student
This graphic organizer shows strategies related to
motivation.
Sets
goals
Adjusts
attitude, if
needed
Uses a
reward
system
Avoids
burnout

Answers

Answer:

Attributes of a highly motivated student

Explanation:

Manuel is recording a macro and made a mistake. What is the best option for addressing this situation? O Pause and rewind the macro to fix it. O Rerecord the macro. O Use the Undo function in Word. Find a more complex way to manage tasks. ​

Answers

Answer:

Pause and rewind the marco to fix it

Explanation:

the answer is number 1

How do you think weather can affect sailing?

What would be good sailing weather?​

Answers

Answer:

Weather can affect sailing because if its raining it can sink it also if theres a storm. Good weather that would be good to sail in is if its a little windy because if its just sunny and not windy it wont move. ps you can copy it if u want idc

Select the correct answer.
What helps the project team to identify the latest software build?
A.
defect
B.
version number
C.
test plan
D.
test environment
E.
hardware

Answers

Answer:

B version number

Explanation:

When talking about careers in designing game art, the unit mentioned that a good portfolio and a clear record of experience in game design boosts your likelihood of employment. Think through all of the different skills you have been learning in this course. If you were given the option to shadow someone using these skills to develop a game, which skills are you most interested in developing right now? What kinds of creations could you add to your portfolio after shadowing someone in this field?​

Answers

Answer:

Explanation:

Many different answerd to this

I dont know what course your taking exactly but i'll do my best <3

Personnally im most interested in balancing in game rewards, balancing AI, or balancing in game currency.

Hmm... I dont really kno what you could add to your portfolio tho. Maybe some things you did that involve what youre interested in doing.

Hope this helps <3

4. Why are forests affected by wars?​

Answers

Answer:

Forests are affected by wars because forest products are used for fulfilling various needs and requirement during war. In the case of India, during the First World ...

Explanation:

Answer:

Forests are affected by wars because forest products are used for fulfilling various needs and requirement during war. In the case of India, during the First World War and the Second World War the forest department cut trees freely to meet British war needs. ... Thus, wars also led to destruction of forests.

What is the scope of numC?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]


def passwordMaker (strA, numC):
answer = dogName[0:3]
return answer + str(numC)

# the main part of your program that calls the function
username = usernameMaker ('Chris', 'Smith')
dogName = 'Sammy'
favoriteNumber = 7
password = passwordMaker (dogName,favoriteNumber)

Options
the entire program

usernameMaker

passwordMaker

# the main part of your program that calls the function

Answers

Answer:

local scope which is the entire body of the function/method that it is being used in

Explanation:

The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.

Answer:

The answer is passwordMaker

Explanation:

Edge 2020.

It is not important to type '=' before a formula or a function

Answers

Answer:

no

Explanation:

because it designates the sum or total

note oj cyber security​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

Network securityApplication securityEndpoint securityData securityIdentity managementDatabase and infrastructure securitycloud securityMobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

Which is an advantage of using a flat file instead of a relational database?
O A flat file is easier to set up.
O It is easier to assign foreign keys to a flat file.
A flat file reduces storage of redundant data.
O A flat file reduces storage of irrelevant data.
Hurryyyyyy plssssss

Answers

Answer:

The answer to this question is given below is the explanation section.

Explanation:

"A flat file is easier to set up" This option is correct

The advantages we will examine is a flat file is easier to setup.A flat file system can be viewed from any number of application making is very accessible. user will also have very little difficult with understanding the data because each record contains all available about a given flight.simple queries and storing should be no problems for most flat file based systems.

Answer:

a

Explanation:

edge

What are characteristics of an effective study space? Check all that apply.
good lighting
O uncomfortable seating
disorganized area
Ofree from distractions
O comfortable temperature

Answers

Answer:

Good lighting

0Free from distractions

The characteristics of an effective study space are as follows:

Good lighting.Free from distractions.Comfortable temperature.

Thus, the correct options for this question are A, D, and E.

What do you mean by Effective study space?

Effective study space may be defined as a type of study space that should have an appropriate amount of learning space for students to be able to accomplish their work. It is the place that is utmostly favorable for students in order to perform their work with their full focus.

An effective study space is only made when it has certain characteristics. It basically includes a good lighting source, free from distractions, and a comfortable temperature for the body. Characteristics like disorganized areas, uncomfortable seating, full of distractions, etc. are not favorable for an effective study space.

Thus, the correct options for this question are A, D, and E.

To learn more about An effective study space, refer to the link:

https://brainly.com/question/8821867

#SPJ6

plzz help me plzzz help me
its very important​


plzzz..........

Answers

Answer:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   while (true) {

     System.out.print("Enter a year (0 to exit): ");

     int year = scan.nextInt();

     if (year == 0) break;

     boolean leap = false;

     if (year % 4 == 0) {

       if (year % 100 == 0) {

         leap = (year % 400 == 0);

       }

       else {

         leap = true;

       }      

     }

     System.out.printf("%d is%s a leap year.\n", year, leap ? "":" not");

   }

 }

}

the volume of two similar solids are 1080cm and 1715cm .if the curved surface area of the smaller cone is 840cm .fond the curved surface area of the larger cone​

Answers

Answer:

[tex]A_{big} = 1143.33cm^2[/tex]

Explanation:

The given parameters are:

[tex]V_{small} = 1080[/tex]

[tex]V_{big} = 1715[/tex]

[tex]C_{small} = 840[/tex]

Required

Determine the curved surface area of the big cone

The volume of a cone is:

[tex]V = \frac{1}{3}\pi r^2h[/tex]

For the big cone:

[tex]V_{big} = \frac{1}{3}\pi R^2H[/tex]

Where

R = radius of the big cone and H = height of the big cone

For the small cone:

[tex]V_{small} = \frac{1}{3}\pi r^2h[/tex]

Where

r = radius of the small cone and H = height of the small cone

Because both cones are similar, then:

[tex]\frac{H}{h} = \frac{R}{r}[/tex]

and

[tex]\frac{V_{big}}{V_{small}} = \frac{\frac{1}{3}\pi R^2H}{\frac{1}{3}\pi r^2h}[/tex]

[tex]\frac{V_{big}}{V_{small}} = \frac{R^2H}{r^2h}[/tex]

Substitute values for Vbig and  Vsmall

[tex]\frac{1715}{1080} = \frac{R^2H}{r^2h}[/tex]

Recall that:[tex]\frac{H}{h} = \frac{R}{r}[/tex]

So, we have:

[tex]\frac{1715}{1080} = \frac{R^2*R}{r^2*r}[/tex]

[tex]\frac{1715}{1080} = \frac{R^3}{r^3}[/tex]

Take cube roots of both sides

[tex]\sqrt[3]{\frac{1715}{1080}} = \frac{R}{r}[/tex]

Factorize

[tex]\sqrt[3]{\frac{343*5}{216*5}} = \frac{R}{r}[/tex]

[tex]\sqrt[3]{\frac{343}{216}} = \frac{R}{r}[/tex]

[tex]\frac{7}{6} = \frac{R}{r}[/tex]

The curved surface area is calculated as:

[tex]Area = \pi rl[/tex]

Where

[tex]l = slant\ height[/tex]

For the big cone:

[tex]A_{big} = \pi RL[/tex]

For the small cone

[tex]A_{small} = \pi rl[/tex]

Because both cones are similar, then:

[tex]\frac{L}{l} = \frac{R}{r}[/tex]

and

[tex]\frac{A_{big}}{A_{small}} = \frac{\pi RL}{\pi rl}[/tex]

[tex]\frac{A_{big}}{A_{small}} = \frac{RL}{rl}[/tex]

This gives:

[tex]\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{L}{l}[/tex]

Recall that:

[tex]\frac{L}{l} = \frac{R}{r}[/tex]

So, we have:

[tex]\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{R}{r}[/tex]

[tex]\frac{A_{big}}{A_{small}} = (\frac{R}{r})^2[/tex]

Make [tex]A_{big}[/tex] the subject

[tex]A_{big} = (\frac{R}{r})^2 * A_{small}[/tex]

Substitute values for [tex]\frac{R}{r}[/tex] and [tex]A_{small}[/tex]

[tex]A_{big} = (\frac{7}{6})^2 * 840[/tex]

[tex]A_{big} = \frac{49}{36} * 840[/tex]

[tex]A_{big} = \frac{49* 840}{36}[/tex]

[tex]A_{big} = 1143.33cm^2[/tex]

Hence, the curved surface area of the big cone is 1143.33cm^2

Explain Bitmap graphics and Vector graphics.
Please help
FASSTTT!!!!!!!!!!!!!!!!1

Answers

A bitmap (also called "raster") graphic is created from rows of different colored pixels that together form an image. ... Rather than a grid of pixels, a vector graphic consists of shapes, curves, lines, and text which together make a picture.

Sierra needs to ensure that when users are entering data into a datasheet or form that they are limited in the values they can select. Which option should she use as the data type?

Lookup list
Bound value
Short-text
Date/time

Answers

Answer:

A

Explanation:

edge

What is DRAM AND SRAM

Answers

Explanation:

Dram=dynamic random access memory

SRAM=static random access memory

Answer:

dram and sram

Explanation:

what is the difference between cd-r, cd-rw and cd-rom​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

          "difference between cd-r, cd-rw and cd-rom​"

CDs are also known as WORM discs,for "write once Read many".A re writable version based on excitable crystals and known as CD-RW was introduced in the mid 1990s because both CD-R and CD-RW recorders originally required a computer to operate  they had limited acceptance of use as computer software.

  A compact Disc Read only memory (CD-ROM) is a read only disc.A compact disc Re-writable (CD-RW) is an erasable disc that can be reused.The data  on a CD-RW disc can be erased and recorded over numerous times.CD-RW may not be readable outside of the drive it was created in.

cd-r :

          CD-R is a digital optical disc storage format.A CD-R disc is compact disc that can be written once and read arbitrarily many times.

          CD-R stand for" compact disc" Record-able .CD-R disc are blank CDs that can record data written by a CD burner.The word "record-able" is used because CD-R are often used to record audio,Which can be play back by most CD players.

cd-rw:

           CD-RW compact disc re-writable is a digital optical disc,storage format introduced in 1997.A CD-RW compact disc can be written read erased and re-written.

in this case of CD-RW the writing laser makes permanent marks in a layers of dye polymer in the disc.CD rewrite-able discs in a similar fashion,except that the change to the recording surface is revers able.

cd-rom:

         CD-Rom observation of compact disc read only memory type of computer memory in the form of compact disc that is read by optical means.A CD-ROM drive uses a low power laser been encoded in the form of tiny pits on a optical disk.The "ROM" part of the term means the data on the disc "read only memory" or cannot be altered or erased.

Consider the following code:
C = 100
C = C + 1
C = C + 1
print (c)
What is output?

Answers

Answer:

The output of C is 102.

100 + 1 + 1 = 102

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions. Online Content: Site 1 When doing career research online, you always want to make sure you are viewing a reliable source, what factors about the website do you want to consider? plz help

Answers

Answer:

You should always look at what they are looking for so that way when you are being interviewed you know what they want immediately. Also, you want to look what positions they are offering.

Explanation:

"Abusing information technology is punishable by the law." Justify this statement with suitable reason. ​

Answers

Answer: See explanation

Explanation:

Information technology is simply defined as the application of technology so as to solve certain issues and achieve a particular goal.

Information Technology abuse is the willful unauthorized activity which impacts on the integrity or the confidentiality of information technology resources.

Examples of information technology abuse include damaging of state records, falsification of records etc. These offences are punishable by law and anyone caught could end up serving some time on jail.

difference between food chain and food web​

Answers

Answer:

A food chain is a basic network that shows the linear flow of nutrients and energy from one trophic level to another. A food web is a multitude of food chains that are interconnected at many trophic levels. Furthermore, a food web accurately represents all the various food chains that exist in an ecosystem.

plzz help....

i will mark u as brainliest if u answer correct

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   while(true) {

     System.out.print("Enter an integer (0 to exit): ");

     int num = scan.nextInt();

     if (num == 0) break;

     if (num%3 == 0 && num%5 == 0) {

       System.out.printf("%d is divisable by both 3 and 5.\n", num);

     }

     else if (num%3 == 0 && num%5 != 0) {

       System.out.printf("%d is divisable by 3 but not by 5.\n", num);

     }

     else if (num%3 != 0 && num%5 == 0) {

       System.out.printf("%d is divisable by 5 but not by 3.\n", num);

     } else {

       System.out.printf("%d is not divisable by 3 or 5.\n", num);

     }

   }

   scan.close();

 }

}

Critical Thinking Questions
1. Choose a game in which something about the art style or motif reflects a culture from a different geopolitical region than the one in which the game was developed Name both the developer's culture (to the best of your knowledge) and the culture of the thing being referenced. In the global market, what would be some of the advantages and concerns of referencing cultural artifacts from outside your own culture?
2. Rate the following games from LEAST to MOST abstract Modern Warfare Pac Man Asteroid Explain how you came up with your ranking
3. Choose a 3D game and discuss the textures used in the game levels Classify at least three textures as tiled or bespoke and explain what led you to your conclusions
4. Think of a 2D game you enjoyed recently Did it use vector graphics or bitmap graphics? How do you think the developers made their decision between which style to use-beyond the consideration of scalability?
5. Consider all of the visuals you see in a typical game. What artistic task was NOT described in the unit--something some artist had to design and implement but which wasn't listed as a specific role or career option. Which kind of artist do you think performs that design task?

i need help badly ​

Answers

Answer:

Explanation:

1) Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed

2) personally i would put them in the order of Asteroid, Pac Man, then modern warfare.

this is all i really know sorry

but i hope this helps <3

Answer:Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed

Explanation:

4. Why isn't it realistic to market a new product using promoted tweets?

Answers

Answer:

Great question

Explanation:

is not realistic because nearly everyone doesn't even consider to look at the ad. Most people actually find it annoying when they are scrolling on their feed and all of a sudden an ad pops up.

Answer:

The tactics cost hundreds of thousands of dollars to implement. ... In other words, not every tweet should be about how great your product is. Use at least one relevant hashtag each time you tweet.

Explanation:

Hope it's help

How do you write a paragraph in a paper? Check all that apply.
- by writing a topic sentence
-by writing a concluding sentence
-by identifying the purpose the paragraph will serve
- by making certain there are sufficient supporting details
- by using transitions to link ideas
-by making certain the paragraph supports the thesis statement

Answers

Answer:

by writing a topic sentence.

Answer:

All of them

Explanation:

Which statements describe the elements of the email function? Check all that apply.

Answers

Which statements describe the elements of the email function? Check all that apply.

Messages are delivered from one email address to another.

An email address can be used to identify the sender in Contacts.

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Answer:

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Explanation:

Elements of email function include the local part of the email which can contain the username, the domain part of the email, the sender, receiver, and other components.

In an Email the elements that are a part of the outlook are Ribbon , Quick Access Toolbar , Reading Pane , Command Groups.

The main elements of the email function are the :

The Messages are delivered from 1 email address to another. The email address is used to identify the sender in the Contacts. All local parts of the email address contains all the user name. The domain parts of the email address has a business name.

Learn more about the elements of the email function.

brainly.com/question/19592165.

distinguish between the desktop publishing packages and multimedia packages​

Answers

Answer:

___________________________________________________________

Word processing software is used for working with text, while desktop publishing software involves production of documents that combine text with graphics. DTP software is perfect for making flyers, brochures, booklets. This type of software is usually more advanced than word processing apps.

___________________________________________________________

make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage smooth workplace

Answers

Answer:

Explanation:

Using your toilet as a trash can. ...

Taking baths and long showers. ...

Conventional showerheadsYou should consider switching to a low-flow showerhead, which uses about 2 gallons of water per minute. ...

Leaky pipes. ...

Laundry loads that are only half full. ...

Running a dishwasher that's not completely full.

Would it be possible for two people to have the same email address? Explain.

Answers

No. They don’t allow you to create the same username
answer: it shouldn’t be
Other Questions
Which of the following is a good nutritional plan for an athlete who is taking a few months off after an injury? I'm confused and not sure if I'm correct. Please Help Please Help! Im Dum A 64.1 kg runner has a speed of 3.10 m/s at one instant during a long-distance event.(a) What is the runner's kinetic energy at this instant?KEi = _________________J(b) If he doubles his speed to reach the finish line, by what factor does his kinetic energy change?KEf/KEi=______________ helpppp me pleaseeee asaaap does this violate the first amendments freedom of religion? why or why not?your public school begins a sporting event with a slide not led prayer over the school's PA system What are all possible values of x if x3 + 9 > 27? I remember hearing sirens for a second time, so my dad walked outside to look. He turned around immediately, and I saw his face turn to horror as he began to scream for us to get downstairs. He screamed for me to get down, but due to my disability, I was unable to. My dad grabbed me and pulled me down to the concrete basement floor. My ears started to pop repeatedly, and I heard a lot of crashing and screaming. It sounded like a jet engine was on top of us. I felt myself being pulled across the basement floor and things were hitting and landing on top of me. All around me were large boards and parts of the flooring from other houses. It looked as if a bomb had gone off. I dont know how we survived it, but luckily, we did. Special Needs and Tornadoes: A Joplin Story,Shandie Reed JohnsonBased on this narrative, which safety precaution could the narrators family take to help keep them safe? Check all that apply.follow a containment planavoid getting close to windowscall 9-1-1move to the lowest part of the houseenter a shelter Codons can be found in...A.humans only B.rocks C.bacteria D.all EXplain the causes of genetic erosion Why was Egypt most likely Nubia/Kush's best customer? Egypt needed the extra food produced by Nubia/Kush. Egypt hired Nubia/Kush's well trained army. Egypt's Pharaohs wanted their temples to be beautifully decorated with gold and precious stones. Egypt wanted the advanced weapons that Nubia/Kush was known for creating. You have 1.2 moles of NH 4 NO 3 in a 6 M solution. How many liters is that?A) 0.5 LB) 0.72 MC) 0.72 L D) 2 L plz help ill mark brailiest Rate yo moma 1-10 of how uglyshe be looin like XD x-2y= 1 3x -6y =3 solve this by using the substitution method What best describes the two central ideas Jefferson expresses in the Declaration of Independence? A. The King of Great Britain has no real power over the colonies since they never consented to his authority. B. People have the right to form their own governments, and the best form of government is a democratically elected one. C. People have certain natural rights, and they have the right to overthrow any government that does not respect these rights. D. Great Britain is too far away to govern the colonies effectively because the most effective governments are local governments. Which of the following is an example of an operational risk for a company that manufactures automobiles?A. A state tax increase that makes buying and registering a car more expensiveB. Rising interest rates that affect the terms of car loans, thereby decreasing demandC. Damage to completed cars held on a storage lotD. A national car rental agency backing out of a contract to buy a certain volume of new carsE. Jerome needs funding to help start a business selling school supplies. He uses a website that connects him directly with a lender who charges a below-market interest rate. Help me pleaseee !! By this point, you hopefully have a fairly full understanding of what a manager does. If you were offered a managerial position (or if you currently hold one), what aspect of being a manager is a natural fit with your skills and personality? Conversely, which aspect do you feel would require more conscious effort on your part? Management is definitely NOT for everyone do you think it is a career path you would enjoy? Determine the x- and y- intercepts for the graph equation y = -8 a. x-intercept is (0, -8) No y-intercept b. No x-intercept y-intercept is (0, -8) c. x-intercept is ( x8, 0) NO y-interceptd. NO x-intercept is ( -8,0) Please select the best answer from the choices prov Steam Workshop Downloader