![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 13.08.2019 04:20 icantspeakengles
Asecurity team is auditing a company’s network logs and notices that a usb drive was previously inserted into several of the servers. many login attempts were then successfully performed using common login information. which of the following actions should be taken to close the vulnerability? (select two.)
(a) disable guest account
(b) remove admin permissions
(c) modify autorun settings
(d) change default credentials
(e) run os security updates
(f) install a software firewall
![ansver](/tpl/images/cats/User.png)
Answers: 3
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 15:30
What is a costume plot? why is it important to a film or theater production?
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 19:10
How might the success of your campaign be affected if you haven’t carefully completed all field data or if you accidentally insert the wrong merge field in the document?
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 16:30
20 points archie wants to use a reflector as he photographs a newlywed couple. what would he consider in his choice? a. shadow and sunny b. homemade and professional c. lamps and boards d. incident and reflected e. neutral density and enhancement
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 18:50
What is transmission control protocol/internet protocol (tcp/ip)? software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons a standard that specifies the format of data as well as the rules to be followed during transmission a simple network protocol that allows the transfer of files between two computers on the internet a standard internet protocol that provides the technical foundation for the public internet as well as for large numbers of private networks
Answers: 2
You know the right answer?
Asecurity team is auditing a company’s network logs and notices that a usb drive was previously inse...
Questions
![question](/tpl/images/cats/health.png)
Health, 12.07.2019 08:50
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 12.07.2019 08:50
![question](/tpl/images/cats/istoriya.png)
History, 12.07.2019 08:50
![question](/tpl/images/cats/biologiya.png)
![question](/tpl/images/cats/istoriya.png)
History, 12.07.2019 08:50
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 12.07.2019 08:50
![question](/tpl/images/cats/istoriya.png)
History, 12.07.2019 08:50
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 12.07.2019 08:50
![question](/tpl/images/cats/mat.png)
Mathematics, 12.07.2019 08:50
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 12.07.2019 08:50
![question](/tpl/images/cats/mat.png)
Mathematics, 12.07.2019 08:50
![question](/tpl/images/cats/mkx.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 12.07.2019 08:50