A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?

Answers

Answer 1

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.


Related Questions

How is effective communication defined as it applies to media?
O The end user delivers the intended message.
O The end user receives the intended message.
O The end user records the intended message.
O The end user agrees with the intended message.

Answers

Answer:

B, if the person you're sending to doesn't get the point it isn't effective. The sender will always know what they're sending but if the person who gets doesn't understand then it doesn't work. They don't need to agree to it for them to understand the message.  

Explanation:

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

What are principles of an API test design?

Answers

Answer:

The five most important principles of an API test design are:

Setup: Create objects, start services, initialize data, etc

Execution: Steps to apply API or the scenario, including logging

Verification: Oracles to evaluate the result of the execution

Reporting: Pass, failed or blocked

Clean up: Pre-test state

Create a program in writecustomerlist. java that allows a user to input customer records (id number, first name, last name, and balance owed) and save each record to a file named customerlist. txt. have the program accept input until zzz is input for the id number. write the records to customerlist. txt in csv format, for example:

101,john,smith,107. 5

41,jill,green,20. 0

when you execute the program, be sure to enter multiple records that have the same last name because you will search for repeated last names in part 4 of this exercise.


write an application named displaysavedcustomerlist. java that reads the file created by the writecustomerlist application and displays the records.


write an application named displayselectedcustomer. java that allows you to enter any id number, reads the customer data file created in step 1, and displays the data for the customer. display the message no records found if the id number cannot be found in the input file.


write an application named displayselectedcustomersbyname. java that allows you to enter any last name and displays all the data for customers with the given last name. display the message no records found if the name cannot be found in the input file.


write an application named displayselectedcustomersbybalance. java that allows you to enter any purchase amount and displays all the data for customers with balances greater than the entered value. display the message no records found if no customers meet the criteria

Answers

Using the knowledge in computational language in JAVA, this code can be written as:

Writing code in JAVA:

public String toString() {

return this.firstName+" " + this.lastName ;

}

System.out.println("Enter First Name: ");

   String firstName = input.nextLine();

   System.out.println("Enter Last Name: ");

   String lastName = input.nextLine();

   System.out.println("Enter Home Address: ");

   String homeAddress = input.nextLine();

   Customer cus = new Customer(firstName, lastName, homeAddress);

   System.out.println("\nWelcome: ");

   System.out.print(cus.getFirstName() + cus.getLastName());

   System.out.println("\n Your Shipping Address: ");

   System.out.print(cus.getHomeShippingAddress());

   List<Customer> customer = new ArrayList<Customer>();

   customer.add(cus);

   printList(customer);

}

public static void printList(List<Customer> list) {

   System.out.println("Customers: ");

   for (Customer customer : list) {

       System.out.printf("%s", customer);

   }

   System.out.println();

}

This JAVA code describes a program in writecustomerlist. java that allows a user to input customer records.

See more about JAVA at brainly.com/question/12975450

#SPJ1

a student is going to e-mail a file she has created and needs to reduce the file size. what tool should she use to reduce the file size?

Answers

Answer:

Compress the file to reduce the file size.

A department requires access to the database application from monday to friday, 9am to 5 pm. last thursday at 1 pm, the application crashed, and it took six hours to fix the problem. what was the availabilty of the application during the week

Answers

Answer:

90%

Explanation:

90%

ELO 4.2 A department requires access to the database application from Monday to Friday, 9AM to 5 PM. Last Thursday at 1 PM, the application crashed, and it took six hours to fix the problem. What was the availability of the application during the week?

You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:

Answers

Answer:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Explanation:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Answer quickly!!!

what type of structural semantics does html describe?

Answers

The type of structural semantics does html describe is known as paragraphs.

What type of structural semantics does HTML describe?

Semantic HTML  is known to be a semantic markup is HTML that  is composed of  or it is one that introduces meaning to the web page instead of just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph.

Based on the above, The type of structural semantics does html describe is known as paragraphs.

Learn more about html from

https://brainly.com/question/13276343

#SPJ2

If you were referencing an e-book what would be the proper citation format?.

Answers

Answer:

Use the standard in-text citation format of author's surname and year of publication to cite an ebook in your work. Include the author's last name and first initial, the year of publication, the italics title of the book, as well as the retrieval information or DOI number in an APA reference list entry.

Hope this helped you! I would appreciate a Brainliest if you wouldn't mind.


E-mail messages create a
permanent record than other forms of business communications.

Answers

Answer:

Explanation:

Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.

For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.

A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.

The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.

Write a function named count_case that takes a string as an argument and returns the count of upper case and lower case characters in the string (in that order). Any characters that are not letters should be ignored.

Answers

Answer:

def count_case(input): #create a function

 uppercase = 0 #declare variables

 lowercase = 0

 for x in input: #loop through user input looking at each letter

   if x.isupper(): #if letter is uppercase

     uppercase += 1 #increment the uppercase counter

   elif x.islower(): #otherwise if it is lowercase

     lowercase += 1 #increment the lowercase counter

 print(uppercase) #print uppercase count

 print(lowercase) #print lowercase count

string = input("enter string: ") #ask for user input

count_case(string) #run function

What does the processor contain?

Answers

Answer:

It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor.

Explanation:



If I want to make it look like slide number one is turning a page to slide number two, what
effect needs to be applied?

Answers

Answer:

Im not certain but I think thwir is one called flip

Explanation:

Kind of works like a book if thats what your asking for

How to construct a speaking library presentation database. how will you use this library and database in the furture? based on what you have learned in this unit, why do you think it is important to have your own speaking library and presentation database? your essay should be 200-500 words in length... please help

Answers

To construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.

What is a speaking library?

A speaking library is a place where audiobooks are present, which can be listened by people.

The importance of a speaking library is blind people can also listen to them and people who cannot read.

Thus, to construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.

Learn more about speaking library

https://brainly.com/question/1348481

#SPJ1

In order to receive financial aid at his vocational school, mario must fill out the fafsa. the fafsa is a form that must be completed to determine . in order to complete a fafsa, you must submit . the fafsa can help students obtain .

Answers

In order to receive financial aid at his vocational school, Mario must fill:

1. Financial and eligibility form.

2. Financial information.

3. Scholarships and grants.

What is financial aid ?

This is known to be funds or support through monetary terms that are give to student or for research purpose.

Therefore, based on the above, In order to receive financial aid at his vocational school, Mario must fill:

1. Financial and eligibility form.

2. Financial information.

3. Scholarships and grants are all correct.

Learn more about financial aid from

https://brainly.com/question/14173570

#SPJ4

Answer:

1. ✔ financial aid eligibility

2. ✔ financial information

3. ✔ scholarships and grants

Explanation:

Kai recently graduated from college with a dual degree—a Bachelor’s in Game Design and Development and a Bachelor’s in Music. The goal is to find a job that will use both degrees, and there is an interview at a video game design studio tomorrow. Kai would love to be in charge of planning, authoring, and implementing the soundscape for games, including sound effects, music, and dialogue. What role at the video game studio would be a good fit?
character rigger

audio designer

artificial intelligence programmer

cinematic artist

Answers

Audio designer

Audio designers plan , sound effects, music and pretty much anything that has to do with sound in a video game

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. A layer 3 switch
b. An SDN controller
c. Storm control
d. A root port

Answers

The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

What is a layer 3 switch?

This is known to help make switch packets by looking at IP addresses and also MAC addresses.

Note that Layer 3 switches helps to separate ports into virtual LANs (VLANs) and carry out the routing between them and as such, The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

Learn more about  switch from

https://brainly.com/question/17245000

#SPJ4

____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced. a.Patch b.Kernel c.OS d.VFS

Answers

Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

What is Patch management?

This is known to be the act or process of sharing and applying updates to different kinds of software.

Note that Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

Learn more about Patch management from

https://brainly.com/question/16270302

#SPJ4

____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Answers

Answer:

Network forensics

Explanation:

hide the most valuable data at the innermost part of the network.

Help me with this question please

Answers

[tex]nested \: selection[/tex]

Explanation:

When the algorithm takes more than one decision before carrying out a task

Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the new role for the vendors and invoices table, update and insert permission for the invoicelineitems table, and select permission for all user tables.

Answers

Answer:

USE AP CREATE ROLE PaymentEntry

GRANT UPDATE, DELETE ON Invoices TO PaymentEntry

GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry

EXEC sp_AddRoleMember db_datareader, PaymentEntry

What option would fit the most content on a page?

1)normal margins
2)wide margins
3)centered margins
4)narrow margins

Answers

Answer:

normal margins will fit the most content on a page

what are the 3 components that make up the ribbon for microsoft?

Answers

Answer:

1. Quick access toolbar (QAT)

2. tabs

3. command buttons

Explanation:

hope this helps:)

different between simplex and duplex data transmission mode​

Answers

In simplex mode, Sender can send the data but that sender can't receive the data. In half duplex mode, Sender can send the data and also can receive the data but one at a time. In full duplex mode, Sender can send the data and also can receive the data simultaneously.

Which email protocol allows an email client to download email messages to the local computer?.

Answers

Answer:

The protocol is called Post Office Protocol version 3(POP3)

Explanation:

Hope this helps!

Doctrine Creative is a video production company with its own file server within its business office. The company needs to be able to access the newest commercial it just finished editing, but the file is too large to send over the World Wide Web. Which type of network would the company be using if it gives the new clients access to its personal file server?


Internet


ftp


Intranet


Extranet

Answers

Answer:

answer is D

Explanation:

The network which the company uses if it gives the new clients access to its personal file server will be Extranet.

What is an extranet?

An intranet that allows authorized outside people to browse portions of it, allowing businesses to securely share information through the internet.

Doctrine Creative is a video production company with its own file server within its business office.

The company needs to be able to access the newest commercial it just finished editing, but the file is too large to send over the World Wide Web.

The network which the company uses if it gives the new clients access to its personal file server will be Extranet.

Thus, the correct option is D.

More about the extranet link is given below.

https://brainly.com/question/13263185

#SPJ1

What is a benefit of being a member of a professional organization?

Answers

Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.

Explanation:

Maxie created a presentation about cats, and she would like her teacher to critique her. Which critique item will help her know if the audience could hear her well?

Group of answer choices

Are you speaking loud and clear?

Are you using facial expressions?

Are you focusing on your topic?

Are you speaking at a good pace?

Answers

Answer:

Are you speaking loud and clear?

Explanation:

If she is speaking loud and clear that probably mean they can hear her.

when working with track changes, what is the difference between simple markup and all markup?

Answers

The single markup gives distraction free view to the document, while all markup gives the visible  inline changes in the document.

What is a markup in Microsoft word?

Markup in Microsoft Word or MS word is the review setting that tracks the changes and the comments in the word with every character.

The single markup is given as the distraction free view of the changes to the reader, with the recording of all the changes in the document. The all markup option will show the changes in the document with different lines and color thereby tracking changes.

Learn more about markup in word, here:

https://brainly.com/question/1419927

#SPJ1

Choose the terms that best complete the sentence.
a
usually has faster connection and transmission speeds than a
.

Answers

A local area usually has faster connection and transmission speeds than a Wide area.

What is local area address?

The term LAN means Local Area Network as it is one that helps to link shared resources and Internet connection.

Note that A local area usually has faster connection and transmission speeds than a Wide area as it covers only a small area of place.

Learn more about  local area  from

https://brainly.com/question/25192887

#SPJ1

Other Questions
Fill in the blanks in the following paragraph to correctly identify phenomena that help provide evidence for the particle nature of light a farmer is able to harvest 300 kg of potatoes in 5 hrs.how many kilos will 3 farmers harvest in 10hrs? What is the sum of the angles in the image?50668676 Task 3: You are an announcer for Telemundo Deportes, a sports TV station, and you are chosen to recap a soccer game from last night. Retell some of the major events and results of the game.Write 3-7 sentences in spanishSome IDEAS (you do not have to do these specific things) for what to talk about:-When was the game?-Who were the teams?-Where is the stadium?-What did the teams wear?-What happened during the game?-Explain a major goal that happened.-Who won the game?Note: This event took place in the past, so make sure you use the preterite! PLEASE HELP ASAPP!!!!! WILL MARK BRAINLIESTif 500 g of iron absorbs 22000 cal of heat, what will be the change in temperature? (specific heat of iron = 0.11 cal/gC) How do I solve this with a fraction? Describe life for Jewish Americans during World War II. Please help.There is a species of frog on an island that puzzles scientists. The proportion of frogs with no stripes is greater than the proportion of frogs with stripes. This is puzzling because the unstriped trait is recessive (s), and the striped patterns are due to dominant alleles (S). Also, natural selection seems to support the striped trait.How do genetic factors most likely account for the proportion of traits in the frog population?A. Most of the striped frogs and unstriped frogs have the genotype ss.B. Most of the striped frogs have the genotype SS and the unstriped frogs have the genotype ss.C. Most of the striped frogs have the genotype SS and the unstriped frogs have the genotype Ss.D. Most of the striped frogs have the genotype Ss and the unstriped frogs have the genotype ss. Which artist called his style, Art Brut? Which of the following macro invertebrates arereferred to as "indicator species" because they aresensitive to pollutants and changes to preferredstream habitat(s)? Choose the three (3) thatapply.A: craneflyB: stoneflyC: mayflyD: aquatic wormE: caddisfly Choose the correct translation for: If we went to the university, we would have better jobs.Si nous irons l'universit, nous aurons des meilleurs travaux.Si nous allions l'universit, nous aurions des meilleurs travaux.Si nous allons l'universit, nous aurons des meilleurs travaux.Si nous allions l'universit, nous avions des meilleurs travaux. 12. Qu es RENFE?A) Es un colectivo de empresas que gestionatoda la fruta y verdura de Espaa.B) Es una empresa pblica estatal quegestiona el transporte en tren en todaEspaa.C) Es la federacin de ftbol de Espaa.D) Es la escuela privada religiosa msimportante de Espaa. Can someone help me? please help me on thisyou get 100 points and possibly get brainliest by how you're answer is wrote and if its right 31. Can two (or more) types of matter occupy the same space at the same time? 32. What is hardest state of matter? 33. What is the softest state of matter? Before I set the table I need to dry these dishes.What is the correct punctuation of the sentence?O Leave as is.O Before I set the table, I need to dry these dishes.O Before I set the table; I need to dry these dishes.Before, I set the table I need to dry these dishes. please help me answer this question QuestionType of cookieCost per cookie,in dollarsChocolate chip$0.73Double chocolate$0.82Oatmeal raisin$0.70SugarXButter pecan$0.86The table above shows a bakery's cost per cookie for each of the five types of cookies the bakery sells. Ifthe mean cost per cookie is $0.73, what is the cost per cookie, in dollars, for a sugar cookie?O $0.54O $0.67O $0.79O $0.84 Based on Reagan's argument, what caused the fall of Communism in the Soviet Union?A. Hungry peasants overthrew the Soviet government in Moscow.B. The struggling Soviet economy collapsed, leading to the fall of communist governments.C. The Soviet Bloc nations turned on each other in civil war.D. Government corruption led to people seeking free elections. Last school year, trent kept track of the amount of time he spent on homework each night. this box plot shows the results. time spent on homework (min.) 20 40 60 80 100 120 what percent of the time did trent spend at least 80 minutes on homework?