You have implemented nap with dhcp enforcement, so you need to ensure you have an updated anti-virus software package, an updated anti-spyware package, and the newest security patches. which servers do you need to set up as remediation servers and why?

Answers

Answer 1
There are several solutions for Anti-Virus such as McAfee ePolicy Orchestrator, Symantec endpoint protection. On the OS Side, Windows has a free WSUS Server that manages Windows Microsoft Patches. Also, SCCM and SCOM are good solutions.

Related Questions

When a computer is booted the checks the computer's components?

Answers

When a computer is booted the checks the computer's components. No, power-on self test (POST) checks the computers components. The OS will check for the OS errors and attached device functionality like printers/scanners/camera, availability of the network, mapped drives, etc.

Complete the recursive function raisetopower(). ex: if userbase is 2 and userexponent is 4, then raisedvalue is assigned with 16 (i.e. 2^4). note: this example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.

Answers

Using the property that x^n is x*x^(n-1) you can write a recursive function:

double raisetopower(double x, int n)
{
   if (n <= 0) {
      return 1.0;
   }
   return x*raisetopower(x, n - 1);
}

Note that this crude implementation does not deal with negative or fractional exponents. But it shows recursion.

A recursive function is one that generates a sequence of terms by repeating or using its previous term as input.

What is meant by a recursive function?

A recursive function is one that generates a sequence of terms by repeating or using its previous term as input. The arithmetic-geometric sequence, which has terms with a common difference between them, is typically the basis on which we learn about this function.

If an input is given, a recursive function's associated output can be defined by equating it to an expression that also contains the values of the function's output for smaller inputs.

Using the property that x^n is x*x^(n-1) you can write a recursive function:

double raisetopower(double x, int n)

{

 if (n <= 0) {

  return 1.0;

 }

 return x*raisetopower(x, n - 1);

}

To learn more about recursive function refer to:

https://brainly.com/question/26781722

#SPJ13

Which safety issue is considered to be a data safety issue?

Answers

Computer and technology-related dangers to an individual's personal, financial, emotional or physical well-being are considered as data safety issues.
There are several things you should do to prevent computer dangers: make regular backups of files, protecting yourself against viruses (use an anti-virus software) , use a  passwords so that access to data is restricted, use a firewall , 

Why must you use a console connection to initially configure the switch? why not connect to the switch via telnet or ssh?

Answers

If we talk about switch Cisco 2960, you must use a console connection instead telnet or ssh to initially configure the switch because, it has no networking services configured when it's first placed and there are no IP addressing parameters configured.
The console connection enables you to have privileged access in the switch which is otherwise not available for telnet or ssh most especially if a password and or secet is enabled in this specific switch. In some cases, the console access is blocked. If this is the case, you can use the end device (PC or laptop) to control the swicth provided it has the required applications to do so.

The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks performed by the cpu.

Answers

I am pretty sure that the statement should be completed like this: The control programs managing computer hardware and software perform the Job management function to control and prioritize tasks performed by the CPU. This king of programs is a part of operating system. Operating system is a set of software that helps to control and maintain computer resources like hardware and software.

What two encryption protocols are commonly used with the hypertext transfer protocol?

a. âtls

b. âssh

c. âaes

d. âssl?

Answers

The answer would be A and D

During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.

Answers

Implementation is the answer.

After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.?

Answers

Testing ensures that all hardware and software components work together

A Song Writer Who Wrote A Song For An Artist And It Became The Number One Hit And He Forgot About It, Who Was He?

Answers

It’s none other than the bearded proto-hippie ‘Eden Ahbez’. 

In 1947, Ahbez approached Nat "King" Cole's manager backstage at the Lincoln Theaterin Los Angeles and handed him the music for his song, "Nature Boy". Cole began playing the song for live audiences to much acclaim, but needed to track down its author before releasing his recording of it.

Ahbez was discovered living under the Hollywood Sign and became the focus of a media frenzy when Cole's version of "Nature Boy" shot to No. 1 on the Billboard charts and remained there for eight consecutive weeks during the summer of 1948. In early 1948, RKO Radio Pictures paid Ahbez $10,000 for the rights to “Nature Boy” to use as the theme song for their film The Boy With Green Hair and he was credited as the song’s composer on the opening titles of the film.

Which conditional formatting rule is best suited to apply formatting to the top five values in a range of values?

Answers

The answer is Top Ten items is the conditional formatting rule that is best suited to apply formatting to the top five values in a range of values.  The excel conditional formatting top or bottom rules permits to put on formatting to cells that gratify a statistical condition in connection to other to other cells in a range. These conditions will only be applied to cells comprising numeric values. The top or bottom conditional formatting option is registered in the excel conditional formatting menu which in general situated in the styles group of the home tab of the excel ribbon. The top ten items dialog box opens up that permits the formatting to apply cells sustaining the chosen criteria and provides option of varying the values of 10 to a different value.

The best conditional formatting rule to highlight top values in Excel is 'Format only top or bottom ranked values.' It allows for easy identification and emphasis on specific data. Custom formatting options and icon sets can further enhance the presentation of top values.

Format only top or bottom ranked values is the conditional formatting rule best suited to apply formatting to the top five values in a range of values in Excel. This rule allows you to easily highlight the top or bottom values based on specific criteria.

New Formatting Rule: After defining the rule criterion, custom formats can be selected by clicking the Format button. The Format Cells window opens to allow custom Number, Font, Border, or Fill formatting for the top values.

Icon sets menu: Excel offers various formatting choices such as data bars, color scales, and icon sets to emphasize top values that meet certain conditions beyond just color fills.

A(n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system.

Answers

The command line is a location on your computer screen where you type text entries to communicate with the computer’s operating system.

Answer:

Command Line Interface (CLI)

Explanation:

A command line interface (CLI) is like a Graphic User Interface (GUI), which is what you normally use when you are operating your computer, the major difference is that the CLI is a text-based user interface (UI)  mainly  used to view and manage computer files. Command line interfaces (CLI) are also called command-line user interfaces, console user interfaces and character user interfaces.

You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believe it is important to secure the windows and unix/linux servers from known shortcomings and vulnerabilities.

Answers

If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There is no such thing as a 100% safe computer, a Mac, Windows, and even Linux are all capable of being infected with a virus or other malware.

Lastly, physical access to any computer that is not encrypted is vulnerable.

A coordinated collection of fonts,colors,and other viscal effects is called

Answers

As far as I remember a coordinated collection of fonts,colors,and other visual effects is called theme. Theme is needed to make the user interface friendlier to the end user. In the document it is just a set of colors and fonts, making it look better.

Invent a board game and then construct a prototype model. include detailed, step-by-step instructions on how to play.

Answers

Write down your ideas. Keeping a log in a sketch book or on a computer can really help get good ideas flowing. Use this log to write out every idea you have about your game as you begin designing it. This will help you quickly separate good ideas from weak ideas. There are two basic approaches to starting your design: Themes and Mechanics. These two concepts are the foundation of all board games.[1] Themes are the “feel” of the game, and can also be referred to as the “genre”. Games like Sorry! have a simple theme of beating your opponent around the board, while complex wargames have the theme of large conflicts and player strategy. Mechanics are the fundamental ways the players interact with the game. In Monopoly, the mechanics are centered around dice-rolling, buying and selling property, and making money. In Axis & Allies, the mechanics deal mainly in moving pieces across a large, interconnected board, while using dice to resolve conflicts between players. There is no right or wrong way to start designing your game. Some people come up with a mechanic, and then create a theme around it, while others come up with a great theme and then tailor the mechanics to match that theme.

I have to writea piece of code to calculate the factorial of somewhat large numbers so the long long type won't suffize, so using vector, I stumbled upon some issues during run time:
'#include
#include

using namespace std;

vector factorial(short n)
{
vector v, z;
do
{
short m = n%10;
v.push_back(m);
}while(n/=10);

short temp = 0;
int x;
//short m = 0;

while(n-1)
{
for(auto &w : v)
{
x = w*(n-1) + temp;
temp = x/10;
z.push_back(x%10);
}
}
return z;
}

int main()
{
short T;
cin >> T;

vector v;
short temp;
while(T--)
{
cin >> temp;
v.push_back(temp);
}

vector tmp;
for(auto &w : v)
{
tmp = factorial(w);
for(auto i=tmp.end(); i!=tmp.begin(); i--)
cout << *i;
cout << endl;
}
return 0;
}
'

Answers

Your second comment is a solution that is actually almost right!!!
Here's what you should fix:

- The array v[200] should be initialized to all zeros, otherwise it may contain junk. You can simply do this by typing short v[200] = {}; right where you declare it.

- Your while loop should loop from all values of n all the way down to 1. So you need while(n>1) in stead of while(n--<=2)

- At the very end of the while loop, before its closing brace, add an n--; to decrement its value. Alternatively you could have created a do {} while construct.

That's it! After that it correctly calculates all 157 digits of 100!

100! = 93326215443944152681699238856266700490715968264381621468592963895217599993229915608941463976156518286253697920827223758251185210916864000000000000000000000000

A registrar, a commercial entity accredited by ________ is responsible for adding new domains to dns data base

Answers

A registrar, a commercial entity accredited by ICANN is responsible for adding new domains to DNS data base.
Other Questions
What is the 24% of 40? During the qing dynasty what european group was invited to the imperial court? Name the steps one should take after testing positive for an STI. Which expression represents the area of triangle ABC in square meters? What would happen if you swallow a bottle of motrin? A Song Writer Who Wrote A Song For An Artist And It Became The Number One Hit And He Forgot About It, Who Was He? ind the area of an octagon with a radius of 6 meters. Round your answer to the nearest tenth. Please answer correct for brainliest Which rays of the electromagnetic spectrum are responsible for causing sunburn when you spend too much time exposed at the beach?A) UltravioletB) X-raysC) GammaD) Visible E) InfraredCorrect answer will be given the Brainliest! :D Opponents of capital punishment have argued that the death penalty is unfair and discriminatory. but it's ridiculous to suggest that cold-blooded murderers should not have to pay for their crimes. how is that fair to the victims or their families? Convert the following using dimensional analysis:13.2 cm to ft & in Convert 28.7251 to degrees, minutes, and seconds. Round to the nearest second. The skin becomes _________ when red blood cell perfusion to the capillary beds of the skin is poor. How would you represent 4 eighth notes as a fraction? Quadrilateral ABCD is similar to quadrilateral EFGH the length of the three longest side in quadrilateral ABCD are 24 feet 16 feet and 12 feet long if the two shortest sides of quadrilateral EFGH feet long and 18 feet long how long is the fourth side on quadrilateral ABCD ? Which one of the following may be used as an input as well as an output device? A. Fax machine B. Scanner C. Printer D. Voice recognition If the x-axis is Quantity and the y-axis is Price, which of the following is the best summarization of the supply shift from S1 to S2? A)The supply decreased.B) The supply stayed the same.C) The supply increased.D) The supply outweighed demand. Jenna surveyed the students at her dance class to find out if they like salsa and/or ballet. The results of her survey are shown in the two-way table below:Like SalsaDo Not Like SalsaTotalLike Ballet3242 74Do Not Like Ballet22426Total5446100If a student does not like ballet, what is the probability that student also does not like salsa? 8.7% 15.4% 18.2% 84.6% Transform both equations in each system of equations so that each coefficient is an integer.***I also need it to be solved using substitution method. What is the purpose of life? Steam Workshop Downloader