What area of the SP 800-100 management maintenance model addresses the actions of the content filter described here?

Answers

Answer 1

Answer:

Security planning, risk management, change management and configuration management.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question. See the attached pdf for the complete question.

The explanation of the answer is now given as follows:

Management maintenance model is a model that assist in the successful management of operations. It is a model with techniques and clear guidelines meant to be employed for attaining the aim of the organization.

SP 800-100 maintenance model is a model that handles the 13th information security areas like security planning, configuration management, governance of information security, incidence response, performance measures, change management, risk management, and among others.

The area of the SP 800-100 management maintenance model which addresses the actions of the content filter described in the question are:

a. Security planning: The security measures put in place is the email content filter which helps to prevent the executable files from attaching to emails. It should be noted that the function of the Security Planning section of SP 800-100 is to serve as a strategic plan that employed to give support to the IT plans and objectives of Sequential Label and Supply Company (SLS).

b. Risk Management: This is because the SLS greatly assist in reducing an accidental execution of dangerous software due to its prevention of executable email attachments.

c. Change management: This monitors the performance of the system continuously without stopping.

It should be noted that there is a need for the configuration of the system to meet the security requirement and also the needs of the user at the same time in such a way that the performance of either of the two is not compromised.

The configuration should meet both security and user needs without compromising the performance of either.


Related Questions

What network appliance senses irregularities and plays an active role in stopping that irregular activity from continuing?
A) System administratorB) FirewallC) IPSD) IDP

Answers

Answer:

C IPS

Explanation:

its called in-plane switching It was designed to solve the main limitations

Write a function, named series_of_letters, that takes a reference to a vector of chars and returns nothing. The function should modify the vector to contain a series of letters increasing from the smallest letter (by ASCII value) in the vector. Note, the vector should not change in size, and the initial contents of the vector (excepting the smallest letter) do not matter.

Answers

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

#include <vector>//defining header file

#include <algorithm>//defining header file

#include <iterator>//defining header file

using namespace std;//use namespace

void series_of_letters(vector<char> &d)//defining a method series_of_letters that accept a vector array  

{

char f = *min_element(d.begin(), d.end()); //defining a character array  that holds parameter address

   int k = 0;//defining integer vaiable  

   std::transform(d.begin(), d.end(), d.begin(), [&f, &k](char c) -> char//use namespace that uses transform method  

   {

       return (char)(f + k++);//return transform values

   });  

}

int main() //defining main method

{

   vector<char> x{ 'h', 'a', 'd' };//defining vector array x that holds character value

   series_of_letters(x);//calling series_of_letters method

   std::copy(x.begin(),x.end(),//use namespace to copy and print values

           std::ostream_iterator<char>(std::cout, " "));//print values

}

Output:

a b c

Explanation:

In the above code, a method "series_of_letters" is defined that accepts a vector array in its parameter, it uses a variable "d" that is a reference type, inside the method a char variable "f" is defined that uses the "min_element" method for holds ita value and use the transform method to convert its value.

Inside the main method, a vector array "x" is defined that holds character value, which is passed into the "series_of_letters" to call the method and it also uses the namespace to print its values.

Write a function biggestAndRest that accepts one argument---a list containing integers. biggestAndRest should then return a tuple with two items: (1) the largest integer in the original list and (2) a nested tuple containing the rest of the items in the original list. For example, biggestAndRest([3,1,4,2]) should return (4, (3,2,1))

Answers

Open your python console and execute the following .py code.

Code:

def biggestAndRest(lis):

   mxE = max(lis)

   maxIdx = lis.index(mxE)

   l2 = lis.copy()

   l2.pop(maxIdx)

   return mxE,tuple(l2)

r = biggestAndRest([3,1,4,2])

print(r)

Output

(4, (3, 1, 2))

Discussion

From [3,1,4,2] it became (4, (3, 1, 2))

following the principle of the function biggest and rest

During the TCP 3-way handshaking process, each side of the communication randomly generates a sequence number, and then sends that random value in a message with the SYN flag turned on. If the sequence numbers were NOT randomly generated and each side had used sequence number 0 to start communication, what potential pitfalls would you expect

Answers

Answer:

Following are the solution to this question:

Explanation:

The handshake TCP 3-way is working as follows:

[tex]Client ------SYN-----> Server\\\\Client <---ACK/SYN---- Server\\\\Client ------ACK-----> Server\\\\[/tex]

In TCP, both parties monitor what they sent from a data packet. It turns out it was an overall byte count of all of the sent. Its recipient may be using the hash value of the opposite user to recognize the receipts, however, TCP is a bi-directional data protocol, that requires both sides to also be able to correctly send data. Its parties involved must create the ISN, but the data packet does not start at 0, and that both sides must accept the ISN of all the other party. It ISN starts with such a random supply voltage (immediate Sequence Number) because TCP is two-way communication, all sides can "talk" but must thus produce an ISN as the starting data packet randomly. Throughout the exchange, both parties must notify another party about ISN which they have started.

When a malicious attacker can not randomly select and configure the hash value appropriately, a TCP-session (that can be secure links to a business, shop, or some other commercial business) could be hijacked. That device has to count every byte of a stream sent for the initial random data packet. It could the network users in just three communications agree from each control message value.

A specific field of series and the identification number is contained for each section. During the first SYN sent to the server, the client selects the original hash value (ISN). The ACK database will add it to the proposed ISN or forward that on the SYN to a client to suggest its ISN (ACKs should remind the sender always of the next planned byte). For instance, whenever the number used for the previous link is the same, the ISN of a Client could be rejected, but that's not taken into consideration.

Its client's ACK typically acknowledges the ISN mostly on the server which maintains contact between these sides, as defined by the acknowledgment sector of the server, ISN + 1 mostly on the server. Realize that perhaps the three-way handshake does not send some information. This should be kept till a link is formed. Its 3-way handshake was its universal process for just a TCP connexion to still be opened. Oddly, the RFC doesn't insist on which communications start that way, particularly when setting certain scale reliability in the Header field (three additional controlling bits are accessible besides SYN and ACK and FIN) because TCP assumes that certain control bits would be used during the connexion establishment and release, but others mostly during transferring data, a great deal of damage could be caused by merely messing up the six scale reliability with crazy variations, especially SYN / ACK / FIN which needs, uses, and completes a link concurrently.

Ed signed up for a weight-loss program. The table shows his weight in pounds in terms of the number of weeks since he began his weight-loss program. Assume that his weight loss is the same every week.

Time
(weeks) Weight
(pounds)
0 205
4 197

Eric also signed up for a weight-loss program. The function y = 200 − 1.5x represents his weight in pounds in terms of the number of weeks since he began his weight-loss program.
Of the two,
loses fewer pounds per week. When the two began their respective weight-loss programs,
was heavier by
pounds.

Answers

Answer:

Answer: of the two, Eric loses fewer lbs per week. When the two began their respective weight-loss programs, Ed was heavier by 5 lbs.

Explanation:

took a test and it was right

Answer:

1. Eric, 2. Ed, 3. 5

Explanation:

Look at the following assignment statements:

word1 = "skate"
word2 = "board"

What is the correct way to concatenate the strings?


newWord = word1 / word2
newWord = word1 + word2
newWord = word1 * word2
newWord = word1 = word2

Answers

The correct way to concatenate the strings is:

newWord = word1 + word2

Answer:

newWord = word1 + word2

Explanation:

What is the best reason a student should cite an online source for a school report?

It demonstrates the credibility of the online source.
It shows the student wants to get a good grade.
It shows the student was interested in the topic.
It demonstrates the length of time it took to write the report.

Answers

Answer:

A

Explanation: B and C are easy to cross off, as they aren't related strictly to citing your sources. D doesn't make sense because anything can be cited in any amount of time. The answer is A.

Answer:

it demonstrates the credibility of the online source for a school report

Explanation:

1. List three hardware computer components? Describe each component, and what its function is.

Answers

Explanation:

I can't just describe it hope this much is fine for the....

Answer:

Three hardware components are;

input deviceoutput deviceC.P.U

The input devices are used to get data into a computer.

The output device are used to get processed data out of a computer.

The C.P.U which is known as the central processing unit, it is known as the brain of the computer, it takes the raw data and turns it into information.

Someone explain? Java

Answers

First, the code initializes a variable of type int. The variable x = 15. The if statement runs if x is greater than 10, which x is greater than 10. The program prints A and B to the console. The else statement is ignored because the if statement runs.

python Factoring of integers. Write a program that asks the user for an integer and then prints out all its factors. For example, when the user enters 150 (which equals 2 * 3 * 5 * 5), the program should print: The factors of 150 are: 2 3 5 5

Answers

Answer:

Written in Python:

num = int(input("Number: "))

i = 2

print("The factors of "+str(num)+" are ",end='')

while num > 1:

     if num%i == 0:

           num = num/i

           print(str(i)+" ",end='')

           i = 2

     else:

           i = i + 1

Explanation:

This line prompts user for input

num = int(input("Number: "))

This line initializes divisor, i to 2

i = 2

This line prints the literal in quotes

print("The factors of "+str(num)+" are ",end='')

The following while loop checks for divisor of user input and prints them accordingly

while num > 1:

     if num%i == 0:  This checks for factor

           num = num/i  Integer division

           print(str(i)+" ",end='')  This prints each factor

           i = 2  This resets the divisor back to 2

     else:

           i = i + 1

The program that asks the user for an integer and then prints out all its factors is represented as follows:

x = int(input("please input an integer: "))

for i in range(1, x+1):

  if x%i == 0:

     print(i)

The first line of code ask the user to input the integer number.

Then we loop through the the range of 1 to the inputted integer plus one.

The integers is then divided by the looped numbers . if it has no remainder then it is a factor.

Finally, we print the factors.

learn more about python here; https://brainly.com/question/17184408?referrer=searchResults

Why is the role of the computer in banking system?

Answers

Answer:

The role of computer in banking system is that it maintain customer accounts, ledger, updating, electronic fund transfer and processing of huge amount of cheques, credit cards and and the major transaction that take place daily.

The roles of the computer in the banking system are to store the account,  information of customers and verify the financial records in a matter of seconds.

What is the function of computers?

A computer's four major functions are to receive data and instructions from a user, process the data according to the instructions, and display or store the produced data.

Computers are used in banks for a variety of purposes. For starters, they aid in saving customer account information and authenticating financial data in a matter of seconds.

Therefore, the computer's role in the banking system is to maintain customer accounts, and ledgers, update electronic fund transfers, and the processing of large amounts of checks, credit cards, and important transactions that occur on a daily basis.

To learn more about the function of computers, refer to the link:

https://brainly.com/question/15827489

#SPJ5

The formula for calculating your BMI is below.

BMI=703weight in pounds(height in inches)2
Which line of code will correctly calculate the BMI? Select 3 options.


bmi = 703 * weight / height ** 2

bmi = 703 * weight / height * height

bmi = (703 * weight) / height ** 2

bmi = 703 * weight / (height * height)

bmi = 703 * weight / height ^ 2

Answers

The first, third, and fourth choices are correct.

The line of code that will correctly calculate the BMI are bmi = 703 * weight/height ** 2, bmi = (703 * weight) / height ** 2,. and bmi = 703 * weight / (height * height). The correct options are a, c, and d.

What is BMI?

Body mass index is a measurement based on a person's weight and height. The BMI is calculated by dividing the body weight by the square of the size, and it is expressed in kilograms per square meter (kg/m2) since weight is measured in kilograms and height is measured in meters.

Body Mass Index (BMI) is calculated by dividing a person's weight in kilograms (or pounds) by their size in meters squared (or feet). People who are exceptionally muscular may have a high BMI because muscle weighs more than fat.

Therefore, the correct options are:

bmi = 703 * weight / height ** 2bmi = (703 * weight) / height ** 2bmi = 703 * weight / (height * height)

To learn more about BMI, refer to the link:

https://brainly.com/question/28517673

#SPJ2

What are two different types of data storage? Which do you think is best and why?
IN AT LEAST 3 SENTENCES

Answers

Answer:

cloud based and hardware

cloud is better because it can be shared virtually, don't have to physically keep track and it does not utilize memory/space on your computer

Explanation: look above

What makes decrease-and-conquer algorithms better candidates for dynamic programming than divide-and-conquer algorithms

Answers

Answer:

The definition including its situation in question is outlined throughout the overview section described.

Explanation:

Divide and Conquer:

By breaking the question across sub-problems, Divide and Conquer functions, iteratively conquering each sub-problem before integrating these approaches.

Dynamic Programming:

Dynamic programming seems to be a solution for addressing challenges with sub-problems that connect. Each sub-problem has only been solved the other day and the outcome of every other sub-problem becomes reserved for future comparisons in something like a table. Those other sub-solutions could be used to achieve the initial solution, although memorization becomes recognized as that of the strategy of preserving the comment section-problem solutions.

Here may be another distinction between divide as well as conquer as well as complex programming:

Divide and conquer:

Does more function and therefore has the additional time required on either the sub-problems. The sub-problems remain independent from each other in splitting and conquering.

Dynamic programming:

Helps to solve only until the sub-problems and afterward preserves that one in the table. Sub-problems are not autonomous in complex programming.

Write a C program which dynamically allocates memory to define an integer array with the length 15 by using the calloc function. Do not forget to free the memory in the end of your program. What happens if you attempt to print your string before and after freeing memory

Answers

Answer:

When you try to print values from the array before setting free the memory previously allocated, it will return values that were inserted while runtime.

For this it is used the calloc, that is a function of the stdlib.h library, of the C programming language. Its objective is to create a vector of dynamic size, that is, defined during the execution of the program. It differs from the malloc function, also from C, because in addition to initializing the memory spaces, it also assigns the value 0 (zero) to each one. It is useful, because in C when a variable is declared, the space in the memory map used by it probably contains some garbage value.

Code:

#include <stdio.h>

#include <stdlib.h>

int main()

{

   int* ptr;

   int n, i;

   n = 15;

   ptr = (int*)calloc(n, sizeof(int));

   if (ptr == NULL) {

       printf("\n Memory is not allocated");

       exit(0);

   }

   else {

       printf("\n Memory allocated");

       for (i = 0; i < n; i++) {

printf("\n Input value in the array at position %d: ",i);

scanf("%d",&ptr[i]);

       }

      printf("\n The elements of the array are: ");

       for (i = 0; i < n; i++) {

           printf("%d, ", ptr[i]);

       }

free(ptr);

   }

return 0;

}

The __________ IP address is the IP address of the local IP host (workstation) from which Wireshark captures packets.

Answers

Answer:

Source

Explanation:

Wireshark is a packet sniffing tool used by network administrators and hackers to monitor data transfer activities within a network.

The wireshark software captures packet in the network from the source workstation or host from which it runs.

When you want to add information to a document, what role does your operating system play?

Answers

Not sure how to answer this question but I have a laptop so when you want to edit or type on a document, that’s already made, click “Editing document”. If you want to make your own click “Open”. Then, click save as if you want to add your name to the document and save it to your device :)

When you want to add information to a document, the operating system assigns the file its name, location, and size.

What is an operating system?

An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

The file's name, location, and size are determined by the operating system. When you add information to a word-processing document, one of the functions of your operating system is to store unsaved work in temporary storage.

Therefore, when you add information to a document, the operating system names locates and sizes the file.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ6

To rename and save a document to OneDrive, you should use which option?

A: save
B: save as
I'm confused since both can let u rename but I can only pick one.

Answers

Answer:

Save as :)

Explanation:

Answer:

Download

Explanation:

I got the answer right on the exam

3.5) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculous

Which of the following are parts of the Physical Layer?


connectors

pins

cables

pointers

Answers

Answer:cables

Explanation:

Answer:

Cable And Connectors

Explanation:

you can apply a gradient or solid background to a publication.​

Answers

Oh okay that’s wassup

Answer:

TRUE!

Explanation:

Click on background

What goes in the red blanks?

Answers

Answer: In the middle you would put the definition or meaning, on the right side you would put the code, on the left side you would put the code in between </    >.

Explanation:

Critical Thinking 5-1: DoS Attacks Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently (within the last two years)

Answers

Explanation:

The DDoS attacks occur when a bad actor bombards an online network or service with very large amounts of traffic in an effort to overwhelm the network and then disrupting the services from their full operation.

Some of the most widely publicized DoS attacks that have occurred recently include:

The AWS (Amazon Web Services) DDoS Attack occurred in February 2020.The GitHub DDoS attack which occurred in February 2018.The Dyn DDoS attack which occurred in October 2016.

discuss at least three artefacts of organizational culture

Answers

Answer:

Artifacts

Espoused Value

Shared Basic Assumptions

Explanation:

Artifacts are the overt and obvious elements of an organization. They’re typically the things even an outsider can see, such as furniture and office layout, dress norms, inside jokes, and mantras. Yes, foosball and free food are also artifacts. Artifacts can be easy to observe but sometimes difficult to understand, especially if your analysis of a culture never goes any deeper. The Palo Alto office of IDEO famously has an airplane wing jutting out from one wall, a surprising and puzzling artifact if one doesn’t understand IDEO’s culture of playful experimentation and free expression.

Espoused values are the company’s declared set of values and norms. Values affect how members interact and represent the organization. Most often, values are reinforced in public declarations, like the aptly named list of core values, but also in the common phrases and norms individuals repeat often. Herb Kelleher was famous for responding to a variety of proposals from Southwest colleagues with the phrase “low cost airline,” reaffirming the espoused value of affordability.

Shared basic assumptions are the bedrock of organizational culture. They are the beliefs and behaviors so deeply embedded that they can sometimes go unnoticed. But basic assumptions are the essence of culture, and the plumb line that espoused values and artifacts square themselves against. Zappos call center employees share a strong belief that providing outstanding service will result in loyal customers, so much so that employees send potential customers to other retailers if Zappos doesn’t have the item in stock. Basic assumptions manifest themselves in a variety of ways. Sometimes they’re reflected in the espoused values and in artifacts, sometimes not. But when basic organizational assumptions don’t align with espoused values, trouble arises. Enron produced a 64-page manual outlining the company’s mission and espousing its core values, but judging by their very “creative” accounting practices, it’s questionable if the executives at the top had ever read it.

You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?

Answers

Answer:

Map

Explanation:

I put it in on Edg and got it correct, hope this helps :)

Answer:

The correct answer is map

Explanation:

I just did the assignment on edge 2020 and got it right

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC

Answers

Answer: 3001.

Explanation:

The Server would acknowledge the 3001 information after it receives two packets of data from the personal computer, which is being used to communicate with the web server of the TCP (Transmission Control Protocol) with a window of 6000.

A TCP is the defined standard which is used for establishing and maintaining a network conversation. this is a medium from which applications programs exchange data.

The TCP is explicitly called the Transmission Control Protocol which allows computing devices to communicate and exchange information by sending packets over a network. Hence, the byte of information acknowledged after receiving 2 packets of data is 3001.

Size perpacket data = 1500 bytes Number of packets sent = 2

The bytes of information acknowledged by the web server can be calculated thus :

Size per packet data sent × number of packets

1500 × 2 = 3000

Therefore, the bytes of information that would be acknowledged by the web server is 3001.

Learn more : https://brainly.com/question/12191237

Computed tomography uses magnetic waves to capture the image.
True or False ?

Answers

Answer:

True

Explanation:

I did it

Answer:

False

Explanation:

What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers

Answers

Answer:

The Time-to-live field

Explanation:

The time to live (TTL) is also the hop limit, it is a way of limiting the lifespan of data that is on a system or network. The TTL is set when a TCP packet has been sent. It is the number of routers that it can go through until the packet is gotten rid of or discarded. The Time to Live ensures that a packet is is forwarded through not more than N routers.

does Assembler directives execute at runtime?

Answers

Answer:

Instructions are executed at run-time. Directives are instructions for the assembler and thus are not really executed at all.

Explanation:

Which command displays various pieces of information about the current IOS version, including the licensing details at the end of the command's output

Answers

Answer:

The show version command

Explanation:

It is the show version command that display various pieces of information about the current IOS version, including the licensing details at the end of the command’s output.

This command is an example of a command that can be used to gather information about the current IOS version running on the given router.

It also has the capability of giving several other manufacturing information about the router in question. Summarily, it helps to give information about details related to the hardware present (e.g memory) and the software (e.g IOS version of the router)

Kelsey noticed one of the new employees at her job is struggling with the amount work assigned to her. What can Kelsey do to support her co-worker?

A: Complete the work for her co-worker.
B: Offer to help her co-worker.
C: Ignore her co-worker. It's none of her business.
D: Document it, then tell her manager.

Answers

Answer:B. Offer to help her co-worker.

Explanation: She can help, but A, meaning she would do all the work for her co-worker and Kelsey not get paid.

B is the best option!

-AW

Answer: B offer to help her co-worker.

Explanation:

Just trust me I did the test.

Other Questions
Ella por la noche antes de dormir. Ose baarse se bana le bao Se bano Complete the sentence with the correct form of the verb in parentheses. Yo el libro en la mesa. (poner) pono O pongo ponga pona Assignment 3: Chatbox python codingI just need something real simple that follows the criteria in simple coding Which is an example of a barrier to exercise? A person is able to perform daily exercise. A person has an injury and cannot work out. A person receives support from family and friends. A person completes an exercise routine three days a week. Jamal can run 1 mile in 5.05 minutes. If Jamal maintains this pace during a 5-kilometer (5K) race, he expects to break the course record of 15.25 minutes. Is Jamal's expectation reasonable? Explain. where is ( -3 1/2, -1 1/4 ) on the coordinate plane? How many moles are in 3.48 x 1023 molecules of H2SO4? a community of organisms and their abiotic factors is called After graduation in 3 years, Antwone would like to take a much needed vacation to the Caribbean Islands. He anticipates that the all inclusive vacation package will cost him $3,000. His bank will pay 7% per year compounded semiannually. How much does he need to deposit into this account each semiannual period, so that he can take his vacation in 3 years? Suppose a few brown mice had a mutation that caused their fur to turn white in coldertemperatures. Would these mice be more or less likely to survive in this environment?MoreLess Write a program that will simulate rolling two dice ( numbers 1 - 6 ) Ask the user how many rolls they want, then using a loop simulate that many dice rolls. Count the number of times the dice land on double 6's and print that total count at the end of the loop. Given g(x) = -x + 2, find g(5). PLZ HELP LOOK AT THE PIC How does Tolkien develop the conflicting viewpoints of Thorin and Gollum with regard to forgiveness in The Hobbit? Tolkien shows Gollum to be empathetic toward Bilbo after he steals the ring, while Thorin is stubborn, refusing to hear Bilbo's reasons for stealing the Arkenstone. Tolkien shows Gollum to be stubborn, refusing to hear Bilbo's reasons for stealing the ring, while Thorin is empathetic toward Bilbo for stealing the Arkenstone. Tolkien shows Gollum to be merciful when forgiving Bilbo for stealing the ring, while Thorin is vengeful for banishing Bilbo after he steals the Arkenstone. Tolkien shows Gollum to be vengeful when he tries to kill Bilbo for stealing the ring, while Thorin is merciful when he forgives Bilbo for stealing the Arkenstone. what is 7x squared - 5 - 2x - 3 + 5 simplified Good customer service are the number one skill for chefs? True or false (D)For the equation 5y = 2 express it in form of linear equation.(A) x + 5y = 2(B) O-r - Sy- we have 10 eggs how many plates do we need if each plate holds 2 egg. Which of the following statements describes how the government of classical Anthens was similar to the modern American government? 5 pointsHow does the EEOC determine if someone is telling the truth in a casedealing with harassment? (Select ALL that apply) *Inherent plausibilityDemeanorOOOOOMotive to FalsifyCorroborationPast Record