The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.
The correct matching for the first part of the question is:
1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans
The correct matching for the second part of the question is:
1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders
The correct matching for the third part of the question is:
1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key
Learn more about The CIA triad:
#SPJ11
Spell Check
Grammar Check
Change
AutoCorrect is the feature of the word processor that corrects this word. AutoCorrect is a software feature that is usually found in word processors and text editing interfaces. This feature mainly functions by correcting spellings and common typing errors. For example if a user types “the winow is closed, autocorrect will automatically change it to “the window is closed”.
Before storage is used in the computing process, data must be processed and manipulated in the CPU (Central Processing Unit). This includes tasks like input processing, calculations, and various operations performed on the data. Once the data has been processed, it can then be stored in storage devices like RAM (Random Access Memory) or long-term storage such as hard drives or SSDs (Solid State Drives).
Answer:
input
Explanation:
Answer:
Brainstorming
Explanation:
Brainstorming is a technique for creating thoughts to take care of a plan issue. It normally includes a gathering, under the heading of a facilitator. The quality of conceptualizing is the potential members have in attracting relationship between their thoughts a free-thinking condition, along these lines widening the arrangement space.
Well, Information technology became important for business operations, it has helped us learn new things and, keep up to date with the things that happen in every day life. Technology has both tangible and intangible benefits that will help you make money and produce, technological infrastructure affects the culture, efficiency and the relationships of world wide businesses.
, it has helped us learn new things and, keep up to date with the things that happen in every day life
Contact ISP, inform provider of issue, ask provider to check server.
Verify server has valid IP address on Lan subnet
Escalate problem to server admin to check issues with server.
Check workstations on Lan for APIPA configuration.
Answer:
The answer is D Check workstations on Lan for APIPA configuration.
Explanation:
1)
While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN.
Pinging the email server form several workstations on the LAN results in 0% packet loss.
Check workstations on Lan for APIPA configuration next step the technician should take in troubleshooting the issue.
Answer:
Check workstations on Lan for APIPA configuration.
Explanation:
IP address is a logical address used in a network to initiate communication between devices. It is assigned to all the end devices like the client computers, servers, printers, scanners etc.
IP addresses can be assigned statically or dynamically. Static IP address configuration requires that a hardcoded address is configured to a computer permanently. The address must be in the same subnet or network. Dynamic IP addressing configures a DHCP server or router to lease IP addresses dynamically to computers. When the computer is unable to reach the server, the APIPA is automatically configured to system which responds to ping but does not receive or send packets to servers.