The Personnel Security Management Network (PSM Net) requires the use of an entity called a_______.

Answers

Answer 1

Answer:

The answer is "SMO".

Explanation:

SMO stands for Security Management Office, it is also known as PSM Net(Personnel Security Management Network). This is a term based on security partnerships with groups of entities rather than divisions or orgs.

It assigns the SMO to the categories of persons for which they are responsible. It enables SMO Safety Managers to take safety precautions, monitor and receive notifications from their employees.

Related Questions

Mike hands the hard drive containing suspicious content to the head of IT security at Bayland Widgets Co. The security guy requests a record of everyone who has been in possession of the hard drive. Given such a scenario, what document should Mike give the IT security chief?

Answers

Answer:

Chain of Custody is the correct answer to the following question.

Explanation:

Because chain of custody is that type of document which is gathered as the data from the scene, in other words it is an evidence which is collected/written during the investigation at crime scene and it is also known as the paper trail. And in the above question Mike handed the hard drive to the security chief that containing the important contents.

Test if a number grade is an A (greater than or equal to 90). If so, print "Great!". Sample Run Enter a Number: 98 Sample Output Great! Hint Grades may be decimals

Answers

Answer:

Using Python language :

a = eval ( input ( "Enter a mark please"))

if ( a <0){

print ("Invalid mark")};

else if (a >=90 && a <=100){ print

( "GREAT")};

Explanation:

The question is about writing a program to check if a number grade is an A by validating the score range and then categorizing it according to a grading scale. The program would likely involve conditional statements to compare the entered score against defined grade thresholds.

To test if a number grade corresponds to an A, a program must first verify that the entered score is within an acceptable range. For a score to be considered an A, it must be greater than or equal to 90 or within a specified range that correlates to an A in a given grading schema. In Python, such a program could look like this:

score = float(input("Enter a score between 0.0 and 1.0: "))
if score < 0.0 or score > 1.0:
   print("Error: Score is out of range.")
elif score >= 0.9:
   print("A")
elif score >= 0.8:
   print("B")
elif score >= 0.7:
   print("C")
elif score >= 0.6:
   print("D")
else:
   print("F")

The standard rules for rounding can also be applied accordingly within the program to ensure that grades like 89.5 are rounded to 90, hence considered an A.

he blinking vertical line that indicates where your text will appear when you type is called the ____.

Answers

Answer:

Insertion point

Explanation:

in software applications that require text input, the insertion point shows where the next text will be inserted, it appears as a blinking vertical line and can be moved by the use of arrow keys or mouse click on the desired location you want it to move to, while  cursor on the other hand indicates where on the screen the user can send a command.

Describing where this quadratic is negative involves describing a set of numbers that are simultaneously greater than the smaller root (+1) and less than the larger root (+3). Write a C++ Boolean expression that is true when the value of this quadratic is negative.

Answers

Answer:

The Boolean Expression is (x >1)&&(x<3)  

Explanation:

As mentioned in the question that to describe where the given quadratic is negative involves describing:

a set of numbers that are greater than the smaller root which is +1a set of numbers that are less than larger root which is +3

So when the quadratic is negative the following boolean expression is true:

                                               (x >1)&&(x<3)

This expression means that the set of numbers are greater than 1 and less than 3. x represents such number. So this boolean expression returns a boolean value true when the 1 and 2 are true. It can also be returned as 1 (which means true in boolean). In the above expression > and < are relational operators used for comparison and & is called logical operator which depicts that both (x>1) and (x<3) should hold or should be true for the expression to return true.

Example of boolean expression

The logic of Boolean expressions is explained with the following chunk of C++ code. For example x is a number, (x>1)&&(x<3) is an expression whose result is stored in "bool" data type variable result. If this expression holds true(i.e. value of x is greater than 1 and less than 3) then output will be 1 (true) otherwise 0(which means false).

int x;

cout<<"enter value";

cin>>x;

bool result;

result=(x>1)&&(x<3);  

  cout<<result;

A _____ element is an element that contains one or more other elements, which are called child elements.
a. family
b. sibling
c. parent
d. descendant

Answers

Answer:

parent

Explanation:

A parent element is usually the outer element that contains one or more other elements, which are called child elements.

Consider the following HTML code:

<div id="parent">

 <p id="childNumberOne"></p>

 <p id="childNumberTwo"></p>

 <p id="childNumberThree"></p>

</div>

The Three P are children of the parent div, and siblings of each other.

A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers.

Answers

A company website or a .com website could have content that might automatically download. I hope this helped.

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

Answers

Answer:

RADIUS  is the correct answer.`

Explanation:

The following answer is correct because radius supports to access the remote dial-in to the network which is corporate and it is also used port 8021x for the wireless and the wired Local Area Network security. It is also supported to access the remote dial-in network that is wireless network. So, that's why the answer is true.

A computer virus is an executable program that attaches to, or infects, other executable programs.

Answers

Answer:

True

Explanation:

The statement given in question is true. Virus is a type of malware that is attached to a file in computer system where it makes copy of itself and spreads in the computer memory very quickly which affects various processes of the system. It reduces performance of the system. They consumes space and resources of the system. If detected on time, virus can be removed easily using antivirus softwares.  

Gary is concerned about unauthorized people entering the company’s building. Of the following, which would be most effective in preventing this?A) Alarm systemsB) FencingC) CamerasD) Security guards

Answers

Answer:

D. Security guards

Explanation:

Physical security means to deny entry into any premises to unauthorized personnel in order to avoid any suspicious and hazardous situation. It is utmost important now a day due to critical law and order situation.  

Options:

A. Alarm systems: Are not so reliable and smart because they can be tampered easily  

B. Fencing: Might be a good option in a remote or rural location but in an urban area it would be very unpleasing sight and also it requires more space which is usually very limited

C. Cameras: It is a good option since it provides evidence in the form of video recording but the above objective will still not be achieved if there is no human intervention available at the premises to stop the intruder. Another problem is of CCTV is blind spots.

D. Security Guards: This option seems to be most reliable to get the job done. Security guard provides multi-sensory response and real time actions with prompt response. There are no blind spots in this case. Can be given tailored instructions unlike alarm systems.

Olivia manages wireless security in her company and wants completely different WiFi access (ie different SSID, different security levels, different authentication methods) in different parts of the company. What’s the best choice for Olivia to select in WAPs?

Answers

Answer:

The right answer is FAT WAP.

Explanation:

There are mostly two types of WAPs.  

Fat WAP: Fat WAPs can be defined as an access point that can not be configured by switches. if the user uses multiple Fat AP then each Fat AP has to configured individually which means that it can give different SSID or passwords.  Thin WAP: Thin WAPs can be defined as an access point which can be configured according to switch. which means Thin AP gives the same configuration while using multiple numbers.

Hence according to the scenario, the most appropriate answer is FAT WAPs because it can be configured as a different WIFI set up in different parts of a company.

_____________ is an application development methodology with which developers create solutions by integrating one or more web services

Answers

Answer:

SOA (Service-oriented architecture)

Explanation:

SOA (Service-oriented architecture) is used to designing networks so that it works optimally in web services environment.

It allows achieving faster and quality environments with less cost. However they can be more complex than the other architectures.

SOA provides advantages in integrating processes and its usage is platform-independent.

What feature would be used to collect how many times users downloaded a product catalog?

Answers

G analytic is perhaps the most frequent approach to find out how many people have downloaded your platform.    

 

G-Analytics is being used to track the operation of a web and gather information about its visitors.G-Analytics operates by embedding code on your website's pages.      

 

The tracking operation gathers information about just the page request in a variety of ways and transmits it to the Analytics server in the following format of length connected to a single picture request.

Learn more information about 'G-Analytics'

https://brainly.com/question/4253357?referrer=searchResults

When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.

Answers

Answer:

echo reply

Explanation:

It is a test that a user performs to confirm that remote system is up and running on the network. This is needed when basic connectivity failure problem appears. Internet Control Message Protocol  renders 2 messages for this service which are Echo Request and Echo Reply. Echo Request is a request sent to a destination device. This system acknowledges with an Echo Reply message. Echo request is generated by destination system with PING program. Ping program is used for testing basic connectivity. An echo reply is sent by target system to the requesting system acknowledging that the echo request has been received.

Test out pc pro 6.0.5 You work at a computer repair store. You want to use the RAID feature on the mother board to configure two RAID arrays. You have installed five new SATA hard drives in the computer. You have installed Windows on the first drive, and you want to use the other four drives in your RAID arrays. In this lab, your task is to complete the following:______________________________. A) Configure RAID for the SATA drive mode. B) Define LD1 as a striped array using all of the space on two disks. C) Define LD2 as a mirrored array using all of the space on two disks.

Answers

Final answer:

To configure RAID arrays on the motherboard, enter the BIOS/UEFI settings, enable RAID for the SATA drive mode, create a striped array (RAID 0) using two disks, and create a mirrored array (RAID 1) using two disks.

Explanation:

To configure RAID arrays on the motherboard, follow these steps:

Enter the motherboard's BIOS or UEFI settings by pressing the designated key during startup.Locate the RAID configuration menu and enable the RAID feature for the SATA drive mode.Create a striped array (RAID 0) by selecting LD1 and configuring it to use two disks and all of their space.Create a mirrored array (RAID 1) by selecting LD2 and configuring it to use two disks and all of their space.

Follow the on-screen prompts to complete the RAID configuration, save your changes, and exit the BIOS or UEFI settings.

Final answer:

To configure RAID arrays on your motherboard, you need to set the SATA drive mode to RAID in the BIOS, and then use RAID management software to define striped and mirrored arrays using the available disks.

Explanation:

To configure RAID arrays using the RAID feature on the motherboard, you need to follow these steps:

Enter the BIOS setup by pressing the appropriate key during startup (usually DEL or F2).Navigate to the SATA configuration menu and set the SATA drive mode to RAID.Save the changes and exit the BIOS setup.After booting into the operating system, open the RAID management software (such as Intel Rapid Storage Technology) provided by the motherboard manufacturer.Define LD1 as a striped array by selecting two disks and using all of their space. This will provide improved performance by splitting data across multiple drives.Define LD2 as a mirrored array by selecting two other disks and using all of their space. This will provide data redundancy and increased data security.

Choose the type of attack that is based on entering fake information into a target network domain name server?

Answers

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

Which layer of the tcp/ip model manages the transmission of binary digits across an ethernet cable?A . data link
B . Physical
C . transport
D . network

Answers

Answer:

The answer is "Option B"

Explanation:

TCP/IP layer also known as Network Access Layer. The physical is used to data transfer between two devices on the same network that will be carried out primarily through this layer. and other options are incorrect that can be described as follows:

In option A, data is information that uses by physical layer protocol that's why it is not correct. In option C, the transport layer aims to enable a conversation between devices in the source and the destination hosts. That's why it is not correct. In option D, In TCP/IP, the Network layer is known as the internet layer that's why it is not correct.

What form of media has both challenged and been successfully co-opted by the traditional media?

A. streaming networks
B. social media
C. citizen journalism
D. cable television

Answers

Answer:

cable television

Explanation:

Cable television has both challenged and been successfully co-opted by the traditional media.

In the Windows command-line syntax, a directory is referred to by which character(s)?

Answers

Answer:

'\' is the correct answer for the above question.

Explanation:

In the windows command line '\' symbol is used for the directory. In any computer system, the hard disk is a large set of memory. so the user needs to partition to make one or more part and that part is known as a drive.

The drive is the most important part of the system so it is uniquely identified on the command line by the help of '\' symbol.

Just for example if a user wants to open the D drive in a window command line by pressing D: then the command line shows--

D:\>

Hence '\' is used to refer the directory in the windows command line. Hence the answer is '\'.  

how to engage more underrepresented and under resourced students in stem programs?

Answers

Answer:

Through after school programs

Explanation:

Under represented and under resourced students can be better engaged in STEM programs through the establishment of after school state of the arts learning centres that can augment for the vacuum in the regular school system.

In such programs, the use of technological platforms with an integrated electronic learning system is necessary, because it avails the students the opportunity to brace up with the evolving impact of information technology to learning and personal developments.

Secondly, the use of immediate resources within the reach of these under privileged and under resourced students is a necessity. for example, a student in a rural community could start become more engage in engineering designs, building technology, instrumentation and architecture through the use of disposed cartons used to construct buildings, cars etc.

In the software development process, when should a design review be conducted?
a. at the completion of the projectb. at the same time as the code reviewc. as the functional and design specifications are being developed based on the requirementsd. during verification

Answers

Answer:

C. as the functional and design specifications are being developed based on the requirements

Explanation:

SDLC (software development life cycle) is the process from abstract design of an application to deployment of the functional application. There are six stages in the development life cycle of an application, They are;

Planning : this is the feasibility study of the needs the application is meant to solve.Analysis: in this stage, the client prior problems and best solution are written down.Design: this stage gives  a graphical design of the application with focus on the problems it is meant to solve. Prototyping and wireframing technologies are used.Development: In this stage, lines of code are written, debugged, tested and continually reviewed.

The other stages are deployment and maintenance.

Final answer:

A design review in software development is best conducted during the development of functional and design specifications to ensure alignment with project requirements and constraints, allowing for necessary refinements.

Explanation:

A design review in the software development process should be conducted as the functional and design specifications are being developed based on the requirements. It is crucial to ensure that the design aligns with the project requirements and constraints before moving forward. Testing and evaluation may reveal weaknesses or areas for improvement in the design, prompting refinements to better meet the criteria.

A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.

Answers

Answer:

Application Programming Interface.

Explanation:

Application Programming Interface(API) is a collection of function, routines, procedures and the protocol which are used create a software application.The main role of API is that it defined or specified how the components of software will interact.

The objective of the Application Programming Interface that it the manufacturer or develop software that is running on system or device. The advantage of using the Application Programming Interface is that we can develop a better program in a very manner by using the API.

Some systems provide a small amount of dedicated memory built into the CPU that maintains a record of previous choices for each of several branch instructions that have been used in the program being executed to aid in determining whether a branch is likely to be taken. What are the contents of this memory called.

Answers

Answer:

Option (B) i.e., branch history table is the correct answer to the following question.

Explanation:

In the above question, some part is missing i.e., options which are:

a) look-ahead table

b) branch history table

c) branch prediction table

d) future speculation table

Because the branch history table maintains the records of the previous data or information and instructions also that are used after when it needed in the program or any other fields and it is the table of the shift register. So that's why the following option is correct. it also used design to store the previous data in the shift register.

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

Answers

Answer:

Tracert 1.2.3.4 is the correct answer.

Explanation:

Tracert is the command that is used to trace the track of the packet of the Internet Protocol. That's why when the user troubleshoots their workstation and then the problem will occur at the time of conversation to the host's IP. So, that's why he using the following command of the to track route of the IP packets.

Josh, as an administrator for a health care company, is required to support an older, legacy application. He’s concerned about the application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?A) Use an application containerB) Implement SDNC) Run the application on a separate VLAND) Insist on an updated version of the application

Answers

Answer:

Use an application container.

Explanation:

Host operating system is software installed in a computer that interacts virtually with a server and also describes the difference between its software and a guest operating system.

It interacts with the hardware and works with atype 2 hypervisor which does not interact with the hardware but create virtual machine interfaces for multiple guest operating system to be installed, which are not necessarily the same as the host os.

Host os can also be used to describe  operating systems that make use of container based virtualization. Containers are storage partitions used to hold applications separately on the same server, instead of replicating the operating system.

So with a container, Josh can separate the legacy application from other applications in the server.

Data ____ travel over the Internet from router to router until reaching their destinations.

Answers

Answer:

Packets.

Explanation:

A data packet is a unit of data carried by a packet-switched network. Data Packets are transmitted along a given network path. Data travels across internet in packets. A packet can carry 1,500 bytes maximum. A packet contains a header and a footer which tells computers what type of data is in the packet, whats the source and destination of the data.

Transmission control protocol and internet protocol is a collection of communication protocols that for sending and receiving date using internet. TCP breaks the data into packets and maintains the network connection and IP deals with the sending and receiving packets from one computer to other using a process called IP Routing which determines the path for the packets to follow from one computer to the other. Once the packets reach their destination, TCP reforms them into their original state.

Where is most of the information processed in a computer

Answers

Answer:

CPU is the correct suitable one-word answer for the above question.

Explanation:

CPU stands central processing units which are the only responsible device for the processing of the instruction given by the user for the demand of some output. CPU is divided into two parts- Arithmetic logic unit and control unit. On which Arithmetic logic unit is responsible for the processing of Arithmetic and logical operation and the control unit is have to control all the operation.

In a computer system there are five main components --

MonitorCPUkeyboardmouseMemory

On which except CPU and Memory, all are the part of the input and output device. Memory and CPU are wrapped in one box known as the Processor device in which memory has to store the data and CPU has to process the data.

With 2020 Kicks’ Easy-Fill Tire Alert, what happens when the correct pressure is reached during inflation?

Answers

Answer:

THE HORN SOUNDS when the correct pressure is reached during inflation with 2020 kicks' Easy-Fill Tire Alert

Explanation:

Properly inflated tires are able to save up to 11 cents per gallon on gas and extend a tire’s life by over 4,000 miles, but it’s hard to know when the tires are at the proper pressure. Luckily, Nissan’s Easy-Fill Tire Alert system will take away the guesswork and help fill tires to the correct pressure every time—without needing a handheld pressure device!

First, park your vehicle and apply the parking brake.

Leave the ignition on (accessory mode) but keep the engine off

As you start to fill a tire, the exterior lights will flash to indicate that the system is monitoring the change in pressure

Once the tire meets the correct pressure, the horn will go off to tell you it’s done

If the tire is over-inflated, the horn will sound again, and the hazard lights will flash 3 times to tell you that you need to release some air

Pressing ____ in the middle of a numbered list creates a new numbered paragraph and automatically renumbers the remainder of the list.
a.[Enter]
b.[Ctrl]
c.[Esc]
d.[Alt]

Answers

Answer:

Option a is the correct answer.

Explanation:

In an MS-WORD Document, when the user wants to write some line with the help of bullets or numbers then he needs to press enter when he had completed the first line and wants to proceed for the second line.

The question scenario also suggests the same which is described above. Hence Enter will fill the blank of the question statement. Hence Option 'a' is the correct answer while the other is not because--

Option b suggests about 'control' key, which is used to select or copy or cut if any other key is pressed with it.Option c suggests about 'ESC' key, which is an escape key used to escape some process.Option d suggest 'ALT' key, which is not used in MS-WORD Document for any purpose.

A security analyst is checking the bash command history on a Linux host that was involved in a data breach. The data breach stemmed from the Linux host running a series of commands against a web server on the internal network, which exploited a vulnerability in an unpatched, outdated Apache module.Given this scenario, which of the following commands might the analyst find in the bash command history for banner grabbing? (Select TWO).A. arpB. tracertC. nmapD. telnetE. nslookup

Answers

Answer:

C. nmap & D. telnet

Explanation:

Why nmap?

nmap is a command that is used to determine which hosts are running and which services are being executed in such hosts. This is a well-known command among the hacking community to provide access to this type of information in order to grab information from open ports.

Why telnet?

Like nmap, telnet is used to examine which ports are opened and which ones are closed. Opened ports represent a breach in the network, leading to hackers accesing the information through this access point.

Natalie is responsible for the security of web servers and is configuring the WAF to allow only encrypted traffic to and from the web server, including from administrators using the command-line interface.
What should she do?

Answers

Answer:

Configured HTTPs forwarding to and from server and SSH

Explanation:

The HTTPs (secure hyper text transfer procotol) is an encrypted form of communicating packets between clients and servers. It has a port number of 443 with a high encryption policy. They are used to secure sites that request user details to prevent claiming of these information by attackers.

The SSH which is an abbreviation of secure shell is used to remotely connect to intermediate devices like routers and switches in a network. unlike its counterpart telnet, it is configured with an automatic encrypted channel with a private key. It also request for password and username.

Other Questions
Enzymes interact with many different substrates a. true or b. false "In which type of disorder do feelings of apprehension or tension occur without an obvious external cause, affecting daily functioning?" In what book of the odyssey do the suitors plan to kill Telemachus? What new ideas were made in salons in France You approach an emergency vehicle that is stopped with its lights flashing. You must:_____________ Jazz is a musical style that originated in 20th century America. African American communities in the South developed jazz. Rooted in African music traditions, it also had European influence. Jazz music features improvisation, syncopation, and strong rhythm. In syncopation, the normal accent is shifted. Usually, the normally unstressed beats are stressed. Improvised music is usually composed on the spur of the moment. Today, jazz music has many types and styles. Jazz-roc, acid jazz, and fusion are just some examples of jazz styles. The further away we get from the beginnings of jazz, the harder it is to define the style of jazz. Many musicians agree that "you know jazz when you hear it" (Gautam 66). Why is part of this paragraph in quotes? A. The author is using a source word for word. B. The author is not using a complete sentence. C. The author is paraphrasing from a source. D. The author is highlighting a dialogue. Rajan Company's most recent balance sheet reported total assets of $1.76 million, total liabilities of $0.87 million, and total equity of $0.89 million. Its Debt to equity ratio is:a) 0.494b) 0.506c) 1.02d) 1.00e) 0.978 How can you tell that these snapdragon do not follow the pattern of complete dominance Which term is an example of a mental effect of abuse? high self-esteem illness eating disorder abusive behavior Amanda Green sold her property to Sally Fay. Amanda will retain title to the property until Sally has paid in full. What kind of contract do Amanda and Sally have? Bobbys football team received four five-yard penalties in the first quarter, which meant his team lost yardage in their progress toward the goal line. What was the change in their progression down the field as a result of these penalties? What are the reasons for having internal controls that facilitate ethical behavior? Jorge made a model of a cell in a clear plastic zipper bag. He used a plum for the nucleus and kidney beans for mitochondria. Why is this model helpful for learning about cells? A. It is made of the same materials as a real cell. B. It can function like a real cell. C. It contains all the same parts as a real cell. D. It is larger than a real cell. Your heart pumps blood at a pressure of 100 mmHg and flow speed of 60 cm/s. At your brain, the blood enters capillaries with such a large total cross-sectional area that the blood velocity is much smaller: about 0.7 mm/s. Ignore viscosity in the capillaries. How long could your neck be so that blood still reaches your brain in m According to Dr. Sandra Collins, what are the three major types of factors which cause conflicts? a. Relationship factors, personal factors, situational factors b. Personal factors, perceptional factors, situational factors c. Situational factors, relationship factors, perceptional factors d. Relationship factors, perceptional factors, personality factors I need help with Algebra 2a wiple Choice which equation describes the relationship20. Multiplethe table?0 0 1 2 3 4 5 616 10 20 30 40 50 60 70A. C= 10nB. C= 10 +nC. C= 10D. C= 10 + 10n Find at least ten solutions to the linear equation 1/2x + y = 5, and plot the points on a coordinate plane. What shape is the graph of the linear equation taking? The posterior lobe of the pituitary gland is NOT a true endocrine gland because ________. A it is unable to function as an endocrine tissue because it is actually part of the neural system due to its location B it is strictly a part of the neural system and has little or nothing to do with hormonal release C embryonically it was an endocrine tissue, but in the adult human it is no longer functional An electrochemical cell is constructed such that on one side a pure nickel electrode is in contact with a solution containing Ni2+ ions at a concentration of 3 103 M. The other cell half consists of a pure Fe electrode that is immersed in a solution of Fe2+ ions having a concentration of 0.1 M. At what temperature will the potential between the two electrodes be +0.140 V? Steam Workshop Downloader