The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
What is Remote Access Trojan (RAT)?This is known to be a worm that is often written in VBS, and it is one that do makes it hard to see on Windows machines and it is one that makes the attacker to have total control over a machine and also they send data back to their server.
Hence, The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
Learn more about trojan malware from
https://brainly.com/question/11831402
#SPJ1
Ben wants to implement a Redundant Array of Independent (RAID) array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use
Ben wants to implement a Redundant Array of Independent (RAID) array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. the Raid type is RAID 10. Option D.
This is further explained below.
What is a Redundant Array of Independent?Generally, RAID, which stands for "redundant arrays of independent disks," is a method of information storing that makes use of numerous hard disk drives in order to save data.
In conclusion, Combining the advantages and drawbacks of RAID 0 striping with those of RAID 1 mirroring, RAID 10 (1+0) is a hybrid solution. Striped disks with complete copies preserved through the mirror are the best solution for Ben's use case, where speed and robustness are critical and the cost is not. Even if their performance is lessening, RAID 5 and RAID 6 are more resilient in the event of a disk failure. Redundancy and read speeds are provided by RAID 1 but write speeds remain unchanged.
Read more about Redundant Array of Independent
https://brainly.com/question/14599303
#SPJ1
CQ
Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?
A. RAID 1
B. RAID 5
C. RAID 6
D. RAID 10
Which function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning?
Product management is the function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning.
What is agile training?This is the term that is used to refer to all of the systematic processes that a team would have to pass through because they would want to improve on the performance of that team. This is done by teaching the concepts of agile to the team or to a particular firm or an organization.
The result when implemented would be an increased performance as well as efficiency of the team that is involved. Hence the product management is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning
Read more on agile training here: https://brainly.com/question/26079067
#SPJ1
A list of user passwords were accidentally leaked as the result of a company policy breach. What actions can you take now to prevent any additional data exposure? Select two answers.
The actions that you can you take now to prevent any additional data exposure are:
Use multi-factor authenticationEducate end usersWhat is a Data Breach?This refers to the situation where there is a loss of data either through hacking or carelessness by a systems administrator.
Therefore, we can see that based on the fact that a list of user passwords was accidentally leaked as the result of a company policy breach, this is a serious data breach and future loss can be prevented if there is:
Use multi-factor authenticationEducate end usersRead more about data breach here:
https://brainly.com/question/13696307
#SPJ1
A computer is completely compromised when it won't turn on or operate. what is the best way to fix it?
Answer: Check to make sure it is plugged into the wall first . or that the power cord is plugged into the laptop and the laptop is charged up.
Explanation:
1. (If you are on a desktop, you need to have it plugged in at all times.)
2. (On a desktop you may need a new power supply or fan if it is an old enough machine, the power supply can be replaced if that does not work you may need a new motherboard or processor chip ..you can test it with a second power supply.
3. Oh, do you have enough ventilation inside the case is the fan working on the back of the case, and are the vents on the front clogged ?? A machine needs free-flowing air from the front to back to cool down the hard drive and the DVD or cd rom players as well as the MB. Use canned air and clean those vents and spray that air everywhere inside the desktop tower ...
4. Age is also a factor when a machine gets too old it will slow down and take longer to come on till one day it just stops.
5.. ( On a desktop, you have the CMOS battery on the MB that helps keep the machine running it is the size of a watch battery and you can get it at the local store.
6.. That battery (CMOS) needs to be replaced at least once a year as it controls your time and date and the year as it is imperative to work on your motherboard for peak performance.
7. You may have a virus,use an antivirus, like AVAST and try to add it on a USB thumb drive to clean the machine outside of windows or mack
What is the difference between the as-is process model and the to-be process model?
AS-IS and TO-BE are phases of BPM (Business Process Management), which allow promoting the improvement of business processes. Therefore, there are two moments: the AS-IS and the TO-BE.
AS-IS is the view of an organization's current processes, which shows how a company performs its activities at a given time. It is common for the term AS-IS to be used synonymously for process analysis.
In AS-IS process analysis, processes are discovered and analyzed. It is time for exploration to create a common vision of the ruptures and deviations in the process.
AS-IS helps in discovering various types of business processes, whether they are primary processes, support processes or management processes.
TO-BE is the vision of an organization's future processes, which shows the best way to carry out the process. TO-BE is also called process design. Its objective is to propose improvements in the organizations' processes, based on what was verified in the AS-IS.
The design of TO-BE processes involves defining the workflow, roles and responsibilities, technologies required for the process, data sources and moments of integration with other processes. The great achievement of TO-BE is to promote real conditions of transformation in processes, improving the organization's competitiveness.
See more about computing at: brainly.com/question/1394311
#SPJ1
How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private good or public good? Explain why.
XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.
How does XM satellite radio work?XM Radio's is known to be a kind of a ground station that is often seen to passes or they transmits a signal in its two active GEO satellites.
Note that it is one that often bounce the signals back down to radio receivers that can be found on the ground.
Hence, the radio receivers are said to be programmed to be able to get receive and they can also unscramble the digital data signal, that has about or more than 170 channels of digital audio.
Therefore, XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.
Learn more about satellite from
https://brainly.com/question/18496962
#SPJ1
Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her _____ memory.
Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic memory.
What is memory?
This is the term that is used to refer to the human ability to store the things that they hear and the things that they see to mind. It is the ability that people have to recollect things that they have seen happen.
The echoic memory is the term that is used to refer to the short term memory that has the ability to store the things that a person would hear. This type of memory may only last for a short while.
Hence we can say that Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic memory.
Read more on echoic memory here: https://brainly.com/question/10196869
#SPJ1
PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES. _____ Group of answer choices
The assertion that PKI is a federal information processing standard that specified an algorithm to replace DES and 3DES is FALSE.
Why is this false?The Public Key Infrastructure (PKI) is a framework which is used to support encryption, and authentication of certificates so that businesses are secure.
There is a federal information processing standard which is used to specify a cryptographic algorithm and this standard. This then replaced DES and 3DES. It is called the Advanced Encryption Standard (AES).
Find out more on the Public Key Infrastructure at https://brainly.com/question/10651021
#SPJ1
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
Answer:
Information processing model
Hope it helps!
Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?
Answer:
A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).
SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).
SAN architecture
A storage area network consists of a fabric layer, host layer and storage layer.
JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and smallest values entered. The solution must use at least these following variables:
counter -a counter to count how many integers were entered
number -the integer most recently input by the user
smallest -the smallest number entered so far
largest -the largest number entered so far
Write three separate programs in JAVA , the first using a while construct, the second using a for construct, and the third using a do while construct. Thank you so much!
Using the knowledge in computational language in JAVA it is possible to write a code that enter a series of 10 integers and then determines and displays the largest and smallest values entered.
Writting the code in JAVA:public class OddEvenSum { // Save as "OddEvenSum.java"
public static void main(String[] args) {
// Declare variables
final int LOWERBOUND = 1;
final int UPPERBOUND = 1000; // Define the bounds
int sumOdd = 0; // For accumulating odd numbers, init to 0
int sumEven = 0; // For accumulating even numbers, init to 0
int absDiff; // Absolute difference between the two sums
// Use a while loop to accumulate the sums from LOWERBOUND to UPPERBOUND
int number = LOWERBOUND; // loop init
while (number <= UPPERBOUND) { // loop test
// number = LOWERBOUND, LOWERBOUND+1, LOWERBOUND+1, ..., UPPERBOUND
// A if-then-else decision
if (number % 2 == 0) { // Even number
sumEven += number; // Same as sumEven = sumEven + number
} else { // Odd number
sumOdd += number; // Same as sumOdd = sumOdd + number
}
++number; // loop update for next number
}
// Another if-then-else Decision
if (sumOdd > sumEven) {
absDiff = sumOdd - sumEven;
} else {
absDiff = sumEven - sumOdd;
}
// OR using one liner conditional expression
//absDiff = (sumOdd > sumEven) ? sumOdd - sumEven : sumEven - sumOdd;
// Print the results
System.out.println("The sum of odd numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumOdd);
System.out.println("The sum of even numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumEven);
System.out.println("The absolute difference between the two sums is: " + absDiff);
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Your workbook has one data source and two worksheets visualizing it. What will be included if you save it as a packaged workbook
If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be Both visualizations and underlying data.
What is data visualization?
This is the term that is used to refer to all of the means by which the data is visualized or made to create meaning to the people that would view it through the use of statistical tools such as graphs, pie charts and other types of visualization.
What the packaged workbook is the local file data that is made up of images that are used in the work book. Hence we say that If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be Both visualizations and underlying data.
Read more on workbook here: https://brainly.com/question/27960083
#SPJ1
Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs
The type of typeface that Derek should use is option D: humanist sans.
What is an typeface?A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.
What defines a humanist font?The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often include forms that looks like the stroke of a pen.
Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.
Learn more about typeface from
https://brainly.com/question/11216613
#SPJ1
Vincent is attempting to remotely log into the system using openssh without success. he asks you what he can do to troubleshoot this problem. what should you recommend first?
In the case above, the command that i need to recommend first is option B. Add the -vvv option on to Vincent's ssh command.
What is SSH command?The Secure Shell (SSH) Protocol is known to be one that allows a user to be able to link up to a remotely located computer from the use of a single computer.
Note that this communication is one that often occurs via a secured encryption process. This kind of connection is one that is often used in file transfer and giving other remote commands.
Note that option B. is one that can enlist Vincent's help, and it is also one that can help him to be able to add the -vvv option on to his ssh command. This will help to give a great amount of information that will assist the person to you track down the issue.
Therefore, In the case above, the command that i need to recommend first is option B. Add the -vvv option on to Vincent's ssh command.
Learn more about open ssh from
https://brainly.com/question/17352088
#SPJ1
An incident response plan should be created be for a software system is released for use.
a. True
b. False
Can traps be generated intentionally by a user program? if so, for what purpose?
Traps be generated intentionally by a user program and It is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.
Can a user program cause a trap?A trap is known to be one that can be used to be able to make or one that is gotten if a user program create a definite service request via the use of the OS.
Note that Traps are known to be a kind of synchronous events as to the fact that the passing of the present instructions are said to be very likely leads to traps.
Hence, Traps be generated intentionally by a user program and It is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs
The control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization is the CASB
What is the SaaS solutions?
This is the term that is used to refer to what is called Software as a service. This is the service that allows for the connection of certain cloud based apps over the internet connection.
This service is known to work for the person that subscribes to it following the pay as you go way. It helps in certain services such as the emails, calendars and in certain office tools.
Hence we can conclude that the CASB is the control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization
Read more on SaaS here: https://brainly.com/question/13615203
#SPJ1
Kourtney is searching for a software package that provides many resources for software developers all in one place. What should Kourtney search for?
The thing or factor that Kourtney need to search for is said to be an integrated development environment.
What is software package?This is known to be a composition or a set of related programs that is said to be made for a specific type of task such as word processing, sold and it is one that a user can be able to use as a single unit.
Since Kourtney is searching for a software package that provides many resources for software developers all in one place, an integrated development environment is the best option for her.
Learn more about software package from
https://brainly.com/question/1538272
#SPJ1
General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another name for this network that operates behind a firewall is a(n): Group of answer choices specialized network extranet intranet information system functional network
Based on the fact that General Electric uses its own private corporate network to link its 340,000 employees behind a firewall, this is called an Intranet.
What is an intranet?An intranet refers to a network that functions like the internet but isn't available to everyone. It is instead available to only people who are part of the organization that set it up.
This intranet allows for its users to share information and communicate with each other using all sorts of tools and collaborative software.
Intranets operate behind a firewall which means that they are less prone to attacks by hackers and can be quite faster. This is what General Electric is doing with its employees which means it uses the intranet.
Find out more on an intranet at https://brainly.com/question/13742795
#SPJ1
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false
Answer:
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.
What is a threat vector?The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.
Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.
The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.
Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.
A threat vector is a piece of code on a distributed device that reports the device's status to a central server.
Thus, the correct option is a.
For more details regarding a threat vector, visit:
https://brainly.com/question/28558110
#SPJ2
The ____ is usually on the right side of the taskbar and displays open services.
The system tray is usually on the right side of the taskbar and displays open services.
What is the system tray known for now?The official name for that which is found in the bottom of the screen is known to be called a “taskbar”.
Note that the taskbar is said to be made up of a number of elements, such as the “Start Button”, and others.
The system tray (or known to be "systray") is said to be an aspect of the taskbars in the Microsoft Windows operating system (OS) user interface that helps one to have a kind of easy access icons to the most commonly used apps.
Therefore, The system tray is usually on the right side of the taskbar and displays open services.
Learn more about system tray from
https://brainly.com/question/17667656
#SPJ1
Which are the external application-oriented devices that provide application security?
Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security.
What is external application-oriented devices?Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security. A firewall functions as a barrier or gatekeeper between your computer and another network like the internet. It works like a traffic controller, monitoring and filtering traffic that desires to acquire access to your operating system. In computing, a firewall exists as a network security system that monitors and prevents incoming and outgoing network traffic established on predetermined security rules. A firewall typically establishes a barrier between a trusted web and an untrusted network, such as the Internet.
An Intrusion Prevention system can respond to this in real-time by blocking or preventing such actions. Network-based IPS systems utilize 'in-line' so that all network traffic can be monitored for malicious codes and attacks. A web application firewall (WAF) exists a firewall that monitors, filters, and blocks data packets as they transit to and from a website or web application. A WAF can be either network-based, host-based, or cloud-based and exists often deployed through a reverse proxy and positioned in front of one or more websites or applications.
To learn more about Firewalls refer to:
https://brainly.com/question/25798879
#SPJ4
Describe server processing of a post request. in the case of cgi processing, how does the server pass information to a cgi program (request headers, body, url parameters, etc. )?
CGI is the part of the Web server that can communicate with other programs running on the server.
What is The Common Gateway Interface?
The Common Gateway Interface (CGI) provides middleware between WWW servers and external databases and information sources. The World Wide Web Consortium (W3C) defined the Common Gateway Interface (CGI) and also defined how a program interacts with an HTTP (Hyper Text Transfer Protocol) server.
The body of the message is sent to the CGI program by the server through the stanard input pipe. Using the value of content_length, which indicates the length of the body, the CGI program can parse the input and obtain the values of the data entered by the user.
See more about CGI at brainly.com/question/12972374
#SPJ1
A technician is troubleshooting a slow wlan and decides to use the split-the-traffic approach. which two parameters would have to be configured to do this?
Answer:
Configure the 5 GHz band for streaming multimedia and time sensitive traffic & Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.
When a database stores view data, it uses a _____ that depends on data in a corresponding _____.
When a database stores view data, it uses a materialized view that depends on data in a corresponding view table. The correct option is 4.
What is a database?A database is a collection of data in an organized and easy way. They store electronic data and manipulate it. An example is an online telephone directory that saves people's contact, name, and addresses.
The materialized view is an organized view of data in the system, and the view table is the table where all the data can be viewed.
Thus, the correct option is 4. Materialized view, view table.
To learn more about the database, refer to the below link:
https://brainly.com/question/25198459
#SPJ1
The question is incomplete. Your most probably complete question is given below:
1. base table, view table
2. materialized view, base table
3. view table, materialized view
4. materialized view, view table
____ is the study of how computers can potentially improve without human programming.
Answer:
Machine Learning and/or Artificial Intelligence (AI)
A machine where the operating system runs an application on top of an operating system is called?
A machine where the operating system runs an application on top of an operating system is called a virtual machine.
What is a virtual machine?A Virtual Machine (VM) is known to be a kind of a tool that is known to often help one to be able to compute resource that make use of software to run programs and carry out apps.
An operating system (OS) is said to be the program that, is known to be one that is being first loaded into the computer as a result of a boot program, and it is one that handles all of the other application programs inside any computer.
Hence, A machine where the operating system runs an application on top of an operating system is called a virtual machine.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ1
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
It means that there are people who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.
What is the joke about?This is known to be a popular joke that is often used by people who are known to be great savvy in the field of mathematics.
The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.
The binary system is one that relies on numbers that are known to be in groups of 2.
Therefore, If the speaker of the above phrase is one who is able to understand binary, that person would be able to say that that the phrase is correctly written as "there are 2 types of people that understand binary".
Learn more about binary from
https://brainly.com/question/21475482
#SPJ1
Which Web application threat allows attackers to pass malicious code to different systems via a Web application
Answer:
An SQL Injection
Explanation:
Web applications are vulnerable to SQL injections which can happen when an unprotected form is linked to a critical database. The attacker can pass in malicious code through the form and modify or even delete the database.
You are the PC technician for a company. You received the following email from an employee:My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well.When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day.What is the BEST way for you to respond
The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
What is the case about?In the case that the email is not working, You as the technician need to meet up with the employee at a given time and show the person the ways and how to use the email program.
Note that teaching employees on how to use their email is not one's your biggest work but it is vital to do so.
Note that out rightly telling an employee that they do not know how to use a program in the right way is not respectful or helpful to them and thus The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
Learn more about PC technician from
https://brainly.com/question/13056638
#SPJ1