Computers and Technology, 03.09.2021 19:20 hrijaymadathil
D. Mention any two software used as ICT tools?
Answers: 1
Computers and Technology, 22.06.2019 03:50, TheViperMlg23676
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
Computers and Technology, 23.06.2019 15:20, manarhizam12
An ou structure in your domain has one ou per department, and all the computer and user accounts are in their respective ous. you have configured several gpos defining computer and user policies and linked the gpos to the domain. a group of managers in the marketing department need different policies that differ from those of the rest of the marketing department users and computers, but you don't want to change the top-level ou structure. which of the following gpo processing features are you most likely to use? a, block inheritance b, gpo enforcement c, wmi filtering d, loopback processing
Answers: 3
D. Mention any two software used as ICT tools? ...
Mathematics, 29.06.2021 14:00
English, 29.06.2021 14:00
Mathematics, 29.06.2021 14:00
Mathematics, 29.06.2021 14:00
Computers and Technology, 29.06.2021 14:00
Mathematics, 29.06.2021 14:00