4. should you perform a live data collection on each system you suspect is compromised? explain your answer.

Answers

Answer 1

Performing a live data collection on each system suspected of being compromised is an important step in the incident response process. This involves collecting data from the running system and analyzing it to determine the extent of the compromise. However, the decision to perform live data collection should be made on a case-by-case basis, taking into account various factors.

One of the main factors to consider is the level of risk associated with the system and the data it holds. If the compromised system is critical to the organization's operations or contains sensitive data, then live data collection is necessary to identify the scope of the compromise and prevent further damage. On the other hand, if the system is of low risk and the compromise is limited, then live data collection may not be necessary.

Another factor to consider is the potential impact of the live data collection on the system. Collecting data from a running system can affect its performance, and in some cases, it may cause the system to crash. Therefore, it's important to weigh the benefits of live data collection against the potential risks and ensure that the collection is performed in a controlled manner. In summary, performing a live data collection on each system suspected of being compromised is an important step in incident response. However, the decision to perform live data collection should be made on a case-by-case basis, taking into account the level of risk associated with the system and the potential impact of the collection on the system.

Learn more about organization's operations here-

https://brainly.com/question/28488715

#SPJ11


Related Questions

HURRY!!!!!!!!!!!!!
Suppose you have a pictorial drawing of a playground design. How would you represent the length of a slide that is 12 feet long?

Answers

Answer:

You make use of a scale (See Explanation)

Explanation:

Given

Length = 12 feet

Required

How would you represent this on drawing.

Knowing that a length of 12 feet can't be drawn on drawing, the best way to do this is to make use of a scale measurement.

The scale to use depends on you and the size of paper at your disposal.

Assume you adopt a scale of 1 inch: 1 feet

This means that a length of 12 feet will be represented by 12 inches in drawings

I need help with computer science
the quiz on e2020 is on hackers and unauthorized access

Answers

Answer:

:) a need help

Explanation:

thanks for the free points ;)

Cryptocurrency is a form of payment that:

• A. can be used for digital or face-to-face transactions.



B. can only be exchanged for specific things.

®

C. exists online and in local banks.



D. can be exchanged online for goods and services.

Answers

Cryptocurrency is a form of payment that can be used for digital or face-to-face transactions. Option A is the correct answer.

Cryptocurrencies  is a decentralized digital currency that is secured through cryptography, and it exists solely online. Cryptocurrencies are not backed by any government or financial institution and can be used to purchase goods and services, as well as exchanged for other currencies. Transactions made using cryptocurrency are recorded in a decentralized public ledger called a blockchain.

Cryptocurrency can be stored in digital wallets and can be bought and sold on various online exchanges. As it is not bound by traditional banking regulations, cryptocurrency has the potential to offer a more secure and efficient way to make payments.

Option A is the correct answer.

You can learn more about Cryptocurrency  at

https://brainly.com/question/26103103

#SPJ11

Question 8 of 10
Which group may provide the best perspective on student life at a particular
school?
A. College deans
B. College professors
C. Freshman-year college students
D. Upperclassmen at the college
SUBMIT

Answers

Answer:

The answer would be D.

Explanation:

Answer:

D. Upperclassmen at the college

Explanation:

define social media and give examples of social media platforms

Answers

Answer:

Social media is interactive digitally-mediated technologies that facilitate the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks. 

Answer:

On social media platforms, users can share information, ideas, and personal messages. Some examples of social media platforms are Face book, twit ter, snap ch at, and (my favorite) Insta gram.

Explanation:

Hope it helped!

Which is an advantage of using "the cloud" to transmit digital signals?

Which is an advantage of using "the cloud" to transmit digital signals?

Answers

The advantage of using "the cloud" to transmit digital signals is option D:

What is the cloud about?

One advantage of using the cloud for transmitting digital signals is increased accessibility and scalability. The cloud allows for remote access to data and resources from anywhere with an internet connection, making it easier for users to access and share information.

Additionally, the cloud has virtually unlimited storage capacity, allowing for seamless scalability to accommodate increasing data storage needs. This eliminates the need for businesses and individuals to invest in expensive physical storage infrastructure, as the cloud provider manages and maintains the servers.

Learn more about cloud from

https://brainly.com/question/19057393

#SPJ1

Computer engineering is a career that......

Answers

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

DO any of yall know where American football came from and when? Because I've researched but I can't find an answer

Answers

The sport of American football itself was relatively new in 1892. Its roots stemmed from two sports, soccer and rugby, which had enjoyed long-time popularity in many nations of the world. On November 6, 1869, Rutgers and Princeton played what was billed as the first college football game.

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Please help!

Whenever I try to align my selected text on docs , my other text also gets aligned at the same . How do I fix this?

Answers

Answer:

I don't know the exact fix to this because I don't know exactly what you're talking about, but I do suggest you instead just highlight with shift and the arrow keys to make it much simpler.

What are the key differences between the IT operations for a large company (ex. Boeing, Ford, Proctor \& Gamble, etc) and the IT operations for a small company (ex. O'fallon Brewery, AAA plumbing services, Mississippi Valley Roofing, etc) Why are there differences? Are there differences in the use of information?

Answers


Key differences between IT operations for large and small companies include scale, complexity, resources, and organizational structure.

In large companies like Boeing, Ford, and Proctor & Gamble, IT operations are characterized by:

Scale: Large companies typically have extensive IT infrastructure and a larger user base, requiring more robust systems to handle the volume and complexity of data and transactions.

Complexity: Large companies often have multiple business units, departments, and global operations, leading to complex IT systems and integration challenges. They may also deal with regulatory compliance, data security, and privacy issues on a larger scale.

Resources: Large companies have the advantage of greater financial resources and can invest in advanced technologies, dedicated IT teams, and outsourcing partnerships to manage their IT operations effectively.

Organizational structure: Large companies often have dedicated IT departments or divisions with specialized roles, such as system administrators, network engineers, database administrators, and cybersecurity experts. These departments collaborate with other business units to align IT strategies with organizational goals.

In contrast, IT operations for small companies like O'fallon Brewery, AAA plumbing services, and Mississippi Valley Roofing tend to exhibit the following characteristics:

Scale: Small companies have relatively smaller IT infrastructures and user bases, requiring less complex systems to manage their operations.

Simplicity: The IT needs of small companies are usually focused on core business processes, such as inventory management, customer relationship management, and financial operations, resulting in simpler IT systems.

Resources: Small companies often have limited financial resources and may rely on off-the-shelf software solutions or cloud-based services to meet their IT requirements. They may also have smaller IT teams or outsource IT functions to external providers.

Organizational structure: In small companies, IT operations may be overseen by a few individuals or managed by a third-party service provider. There is typically less formalized organizational structure and IT responsibilities may be shared among employees wearing multiple hats.

Differences in the use of information between large and small companies depend on their specific business needs and strategies. Large companies often collect and analyze vast amounts of data for business intelligence, market research, and decision-making. They may leverage data-driven technologies like big data analytics, machine learning, and artificial intelligence to gain competitive advantages. On the other hand, small companies may focus more on operational efficiency and immediate business needs, utilizing information for day-to-day operations, customer interactions, and financial management.

In conclusion, the key differences between IT operations for large and small companies lie in scale, complexity, resources, and organizational structure. Large companies have larger-scale IT infrastructure, deal with more complexity, have greater resources, and often have dedicated IT departments. Small companies, in contrast, have smaller-scale IT infrastructure, deal with simpler systems, have limited resources, and may rely on external providers for IT services. The use of information also varies based on the business needs and strategies of each company

To know more about IT operations ,visit:
https://brainly.com/question/31726700
#SPJ11

i need answer pooooooo​

i need answer pooooooo

Answers

Read the instructions right, youll get ir done

IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?

Answers

Answer:

The American Registry for Internet Numbers ARIN

Explanation:

The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands

There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.

John wants to add a border to an image he has inserted on a slide. Which of the following groups on the Picture Tools Format tab should he use?

Answers

Since John wants to add a border an image he has inserted on a slide. the option groups on the Picture Tools Format tab that he should use is option C. Picture styles.

What is the use of picture tool?

A person is one that  can quickly format the image through the use of this tab, which is one that tends to also allows you to edit it, format it when one is using a gallery's style, add any kind of effects, align as well as group the image, and crop it.

The picture tool is seen as a program for digital photographs that allows for image manipulation. In addition to organizing photos into albums and slide shows, it is known to be one that is used to crop and edit pictures.

Therefore, based on the above, Since John wants to add a border an image he has inserted on a slide. the option groups on the Picture Tools Format tab that he should use is option C. Picture styles.

Learn more about Picture Tools Format from

https://brainly.com/question/4534514
#SPJ1

John wants to add a border an image he has inserted on a slide. Which of the following groups on the Picture Tools Format tab should he use

A. Adjust

B. Size

C. Picture styles

D. Arrange

A spreadsheet program allows a user to _______. a. perform complicated calculations automatically b. deliver elegant presentation to a large audience easily c. organize, send, and retrieve e-mails quickly d. keep viruses from infecting their computers please select the best answer from the choices provided a b c d

Answers

Answer:

c

Explanation:

PLS HURRY!!! Look at the image below!
The choices for the second part are number +1, number, number -1

PLS HURRY!!! Look at the image below!The choices for the second part are number +1, number, number -1

Answers

1. <1

2. -1

Explanation:

A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?

Answers

In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.

What is sniffing?

In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.

A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.

Thus, the correct option is a. Sniffing.

To learn more about sniffing, refer to the below link:

https://brainly.com/question/17100775

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. Sniffing

b. Spoofing

c. Hijacking

d. Impersonation

Who did Connie Macpherson think her visitor was?​

Answers

Connie Macpherson thought that her visitor was her husband,Jim!

I hope it will helps you!

Does white space have visual weight? Yes or No

Answers

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

Answer:

no

Explanation:

it's because it appears to be empty.

suppose that you have a four-byte integer x that contains two sixteen-bit values, one in the high sixteen bits and one in the low sixteen bits. you want to store the value of the integer in the high sixteen bits to a second variable y. what types of operations must you use to accomplish this?

Answers

Answer:idrk whats the assement name

Explanation:

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

I need help with this question

What is the “digital divide”?

A. the gap between people who are very skilled using the Internet and people who are less skilled.

B. the gap between the time before Smartphones debuted and the time they became widely used.

C. the gap between people who have readily available Internet access and people who do not.

D. the gap between the time before the Internet debuted and the time it became popular.

Answers

Answer:

C IS YOUR ANSWERexplanation is available

Explanation:

The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.

Answer:

option c is the answer....

If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
My group is One Percenters

Answers

Answer:kk ima do it

Explanation:

Answer:

this and that

Explanation:

this and that

when designing a new database, the first question users should ask themselves is ________.

Answers

When designing a new database, the first question users should ask themselves is "What are the requirements for the database".

Understanding the requirements for the database is critical to designing a database that will meet the needs of its users. The requirements should be defined based on the business needs of the organization or the purpose of the database. Some questions to consider when defining the requirements might include:What data needs to be stored in the database?How will the data be organized and structured?Who will be using the database and what tasks will they be performing?What performance and scalability requirements need to be met?What security and privacy considerations need to be addressed?By answering these questions and defining the requirements for the database upfront, users can create a more effective and efficient database design that will better serve their needs.

To know more about database click the link below:

brainly.com/question/31518820

#SPJ11

Write a procedure, called compose, that takes two one-place functions f and g as arguments. It should return a new function, the composition of its input functions, which computes g(f(x)) when passed the argument x

Answers

The procedure "compose" takes two one-place functions f and g as arguments and returns a new function that computes g(f(x)).

The procedure "compose" is used to combine two one-place functions, f and g, in such a way that the output of the first function (f) is used as the input for the second function (g). This is accomplished by defining a new function that takes a single argument (x), applies f to it, and then applies g to the result.

The resulting function computes g(f(x)) when passed the argument x. This composition allows for the chaining of functions, allowing complex operations to be constructed from simpler ones. The ability to compose functions is a fundamental concept in functional programming and is used extensively in mathematics, computer science, and other fields.

For more questions like Function click the link below:

https://brainly.com/question/30011747

#SPJ11

Convert pounds to ounces.
(1 pound = 16 ounces)


14 pounds = _________ × (1 pound)


= _________ × ( _________ ounces)


= _________ ounces +BrainList

Answers

Answer: yt can work

Explanation:

that  will help

Answer:

All your questions got removed

Explanation:

dont give  points next time

Which technology below can be used to set up passwordless SSH logins by distributing a server SSH certificate

Answers

One technology that can be used to set up passwordless SSH logins by distributing a server SSH certificate is the SSH Public Key Authentication method.

SSH Public Key Authentication is a secure method for logging into a remote server without the need for a password. It involves the use of public-private key pairs. In this scenario, the server's SSH certificate would be generated and signed by a trusted certificate authority (CA). The server's public key would then be distributed to the clients who wish to connect to the server.

The clients would generate their own key pairs and add their public keys to the server's authorized_keys file. When a client attempts to connect to the server, the server verifies the client's identity by using the client's private key to encrypt a challenge provided by the server. If the server can successfully decrypt the challenge using the client's public key, the client is authenticated and granted access without requiring a password. This method provides a higher level of security compared to traditional password-based authentication and eliminates the need to remember and manage passwords for SSH logins.

Learn more about SSH certificate here:

https://brainly.com/question/33365211

#SPJ11

healing messages are a feature of what smart home protocol?

Answers

Healing messages are a feature of the Zigbee smart home protocol. Zigbee is a wireless communication protocol specifically designed for low-power devices in smart homes and Internet of Things (IoT) applications.

It enables devices to communicate with each other and form a mesh network, allowing for efficient and reliable communication. Healing messages are a feature within the Zigbee protocol that allows devices to self-heal and optimize network performance. When a device joins or leaves the network, healing messages are sent to update the network routing tables and ensure that devices can communicate effectively. These messages help to maintain a stable and efficient network, reducing latency and improving overall performance. Zigbee is widely used in smart home systems and is supported by many popular smart home hubs and devices.

To know more about Zigbee visit:

https://brainly.com/question/31792609

#SPJ11

(03.05 LC
A reliable textbook should contain references to (6 points)
O only primary sources
mainly secondary sources
O both primary and secondary sources
no more than two of each type of source
Helpppp plzzzzz

(03.05 LCA reliable textbook should contain references to (6 points)O only primary sourcesmainly secondary

Answers

Answer:

B. both primary and secondary sources.

Explanation:

Information can be defined as processed data that can be used to perform specific tasks or job functions. The two (2) main sources of information are;

I. Primary source: this type of source comprises of raw information that are first-hand in nature i.e a personal experience or witness of an event (occurrence).

II. Secondary source: this type of source relies solely on the primary source for its information and as such it comprises of second-hand information provided by other authors or researchers.

A reliable source is an information source that is unbiased, trustworthy and reliable. Also, a reliable source is typically backed up by evidence from various information channels and should be accurate.

In order to validate a reliable source, it is necessary that the information provided is checked against other credible sources to verify its accuracy.

This simply means that, if you got an information (data) from any source such as newspaper, website, television, books, radio or anywhere else, you should confirm the credibility and reliability of these information by verifying from one or more sources listed in the reference.

Hence, a reliable textbook should contain references to both primary and secondary sources.

Additionally, references are citations or links to all of the sources from which an author, writer, or researcher got his or her information from. One important thing that references show a reader is that the information is well researched.

Trees 1. 2. 3. 4. 5.​

Answers

Answer:

ano po. yan. di. ko. maintindihan. ang. tanong. niyo

Other Questions
Which of the following best describes sociology as a subject. Can Someone give me some example of affirmative/negative formal usted commandsPLS HELP In the late 1700's, Australia was known to most of the world as a colony for British ___________.Question options:A. royaltyB. military campsC. criminalsD. gold prospectors FREE BRAINLIEST!! ill also answer questions that you have posted if you answer correctly!!!! (61pts) Why was the Battle of Midway a turning point in the US war with Japan? A) The US captured a Japanese code machine in the battle. B) The US won a victory despite being forced to retreat. C) The US faced the Japanese with overwhelming force. D) The US stopped the Japanese advance in the Pacific. The molar solubility of Cd(OH)2 is 1.84105M in water. The expected solubility of Cd(OH)2 in a buffer solution of pH=12 is: 1.84109M 2.4910M 6.231011M 2.491010M There are eight boys and seven girls in a class. The teacher randomly selects three different students to answer questions. What is the probability that the first two students are girls followed by a boy? In college you practically existed on instant noodles, but now you earn $95,000 a year. you never want to see instant noodles again. we can safely conclude that you consider instant noodles to be a(n)? Which possible discovery would be attributed to an inorganic molecule? moral responsibilities and moral rule are terms most commonly associated with what type of justice? A group of mountain climbers walked 10km north from their camp, then walk 20km more to the east. a. What was the total distance walked by the mountain climbers? b. Determine the total displacement from the starting point which department ensures that all new sales contracts comply with the ethical standards of the company mention THREE reasons why protestors in an advocacy campaign should avoid violence during their protest Read the excerpt from "Machu Picchu: A City in the Sky.The great Incan Empire did not last. In 1530, a Spanish army invaded the Incas land. Incas lived in the hidden city of Machu Picchu until the 1550s. They used this city and others in the mountains as hideouts. The Incas left the cities to fight the Spanish soldiers. Then, they returned to wait for another chance to attack. But the bronze and stone spears of the Incas were no match for the guns and cannons of the Spanish. By 1572, Spain had conquered most of the Incan Empire.What is the best summary of the excerpt?The Incan people hid in their mountain cities and avoided war with Spanish invaders in the 1550s.The Incan Empire and many of its mountain cities were destroyed by Spain in the 1500s.The Incan Empire is always remembered for its beautiful bronze and stone weaponry.The Incan people were conquered by Spanish explorers who longed to take over the Andes Mountains. why were black power and black nationalism compelling to many african americans? The twelve disciplesmatch the following Joseph is shopping for school supplies. The store is selling 4 notebooks for $5. Joseph needs to buy 5 notebooks. How much will it cost? Explain how you found your answer. Prepare the journal entry to record the payment of accounts payable for inventory that was purchased with the terms 2/10 net 30. The inventory purchase was for 18,000 and the payment will be within the discount period. He is very intelligent !a) exclamatory b) affirmative c) declarativeFAST FIRST WILL GET BRAINLIEST SOMEONE please Help I will mark you BRAINLISTDo a quick 5 minute search and write 3-5 sentences about a landmark medical ethics case.