A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?

a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work

Answers

Answer 1

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.


Related Questions

What is
relation degree.

Answers

Answer:

Explanation:

The degree of relationship can be defined as the number of occurrences in one entity that is associated with the number of occurrences in another entity. There is the three degree of relationship: One-to-one (1:1) One-to-many (1:M)

The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (how many bits/sec it can transport) and the latency (how many seconds it takes for the first bit to get from the client to the server). Give an example of a network that exhibits high bandwidth but also high latency. Also give an example of one that has both low bandwidth and low latency. Justify/explain your answers. (

Answers

Answer:

A bandwidth is the maximum rate of transfer of data across a given path

Latency refers to the delay of data to travel or move between a source and destination

An example of a high bandwidth and high latency network is the Satellite Internet connectivity.

An example of a low bandwidth and latency network is the telephone system connection.

Explanation:

Solution

Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.

Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.

An example of a high bandwidth and high latency network is the Satellite internet connection.

Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.

So, satellite internet connection is compensated with high latency and high bandwidth.

An example of a low bandwidth and low latency network is the Telephony network.

Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.

An example of a network that exhibits high bandwidth but also high latency is Satellite internet connection.

An example of one that has both low bandwidth and low latency is telephony internet connection.

Based on the provided information, we can say that Satellite internet connection posses high bandwidth but also high latency because, the fastness of data transfer is based on the bandwidth and how the data to travel between it's source and destination is based on its latency.

We can conclude that telephony internet connection has low bandwidth and low latency because of low data transfer is required.

Learn more about bandwidth at;

https://brainly.com/question/11408596

Describe any five GSM PLMN basic services?

Answers

Answer:

Your answer can be found in the explanation below.

Explanation:

GSM is the abbreviation for Global System for Mobile communication. Its purpose is to transmit voice and data services over a range. It is a digital cellular technology.

PLMN is the abbreviation for Public Land Mobile network. It is defined as the wireless communication service or combination of services rendered by a telecommunication operator.

The plmn consists of technologies that range from Egde to 3G to 4G/LTE.

PLMN consists of different services to its mobile subscribers or users but for the purpose of this question, i will be pointing out just 5 of them alongside its definitions.

1. Emergency calls services to fire or police: Plmn provides us with the option to make emergency calls in the event of any accident or fire incident, etc.It is available on devices either when locked or unlocked.

2. Voice calls to/from other PLMN: This entails the putting of calls across to persons we cannot reach very quickly. PLMN helps to connect persons through its network of from other networks thus making communication easier.

3. Internet connectivity: PLMN provieds us with internet services through wifi or bundles that enable us have access to the internet as well as help us communicate with people and loved ones over a distance. Internet service are possble either on GPRS or 3G or 4G networks.

4. SMS service: SMS means short messaging service. This is also know as text messages. PLMN allows us to be able to send short messages to people as oppposed to mails. It is mostly instant and can be sent or recieved from the same PLMN or others.

5. MMS service: Multimedia messaging service whose short form is MMS ccan be descibed as the exchange of heavier messages such as a picture or music or document but not from an email. It is availabel for use from one PLMN to another.

Cheers.

All of the following are true about hacksaws except: a. A hacksaw only cuts on the forward stroke. b. A coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. c. A fine hacksaw blade (one with many teeth) is better for cutting sheet metal. d. A hacksaw blade is hardened in the center, so it is best to saw only with the center portion of the blade.

Answers

B is INCORRECT good sir. The Hope this helps, brainiest please.

All of the following are true about hacksaws, except a coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. The correct option is b.

What is a hacksaw?

A hacksaw is a saw with fine teeth that were originally and primarily used to cut metal. Typically, a bow saw is used to cut wood and is the corresponding saw.

Hacksaw is used by hand, it is a small tool for cutting pipes rods wood etc that is very common and homes and in shops. The different types of hacksaws. The main three types of hacksaws are course-grade hacksaws, medium-grade hacksaws, and fine-grade hacks. The difference is just for the quality, and the design of the blade.

Therefore, the correct option is b. Cutting thick steel is easier with a coarse hacksaw blade (one with fewer teeth) than a fine one.

To learn more about hacksaw, refer to the below link:

https://brainly.com/question/15611752

#SPJ2

if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete

Answers

It would be C- crop. This allows you to specifically delete parts of the image using drag and drop features. Hope this helps!

DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers. Respond to the following in a minimum of 175 words: Identify one network security strategy that would help this organization. Why did you choose this strategy over others

Answers

Answer:

What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.

Explanation:

Solution

There are different network security strategy which is listed below:

Segment the network:

Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.

Test your infrastructure :

Testing infrastructure also very good technique.

Always we have to test our infrastructure whether threat is occur or not.

If any threat is happen we can detect that easily by testing our infrastructure.

Regularly update anti-virus software :

This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.

Frequently backup your critical data :

This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.

This is less costs and simple.

Change router default security settings :

Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.

If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?

Answers

Most likely not but I think you’ll have to log in your account like if you have an Apple phone . You’ll have to log into your Apple ID

Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:

8 16 32 64

#include

using namespace std;

int main() {

int numInsects = 0;

numInsects = 8; // Must be >= 1

while (numInsects < 100) {

numInsects = numInsects * 2;



cout << numInsects << " ";

}

cout << endl;

return 0;

}

So my question is what am I doing wrong?

Answers

Answer:

The cout<<numInsects<<""; statement should be placed before numInsects = numInsects * 2;  in the while loop.

Explanation:

Your program gives the following output:

16  32  64  128

However it should give the following output:

8  16  32  64

Lets see while loop to check what you did wrong in your program:

The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100.

So the body of while loop executes. numInsects = numInsects * 2;  statement in the body multiplies the value of numInsects i.e 8 with 2 and then cout << numInsects << " ";  prints the value of numInsects  AFTER the multiplication with 2 is performed. So 8 is not printed in output but instead 16 (the result of 8*2=16) is printed as the result of first iteration.

So lets change the while loop as follows:

while (numInsects < 100) {

cout << numInsects << " ";

numInsects = numInsects * 2;

Now lets see how it works.

The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100

So the body of while loop executes. cout << numInsects << " "; first prints the value of numInsects i.e. 8. Next numInsects = numInsects * 2;  multiplies the value of numInsects i.e 8 with 2. So first 8 is printed on the output screen. Then the multiplication i.e. 8*2=16 is performed as the result of first iteration. So now value of numInsects becomes 16.

Next the while loop condition numInsects < 100 is again checked. It is true again as 16<100. Now cout << numInsects << " "; is executed which prints 16. After this, the multiplication is again performed and new value of numInsects becomes 32 at second iteration. This is how while loops continues to execute.

So this while loop stops when the value of numInsects exceeds 100.

A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?

a. Network tap
b. Honeypot
c. Aggregation
d. Port mirror

Answers

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto

Answers

Answer:

Let f be a function  

a) f(n) = n²  

b) f(n) = n/2  

c) f(n) = 0  

Explanation:  

a) f(n) = n²  

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.  

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                               f(a) = f(b) ⇒ a² = b² ⇒ a = b  

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.  

b) f(n) = n/2  

The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:

                               f(2n) = [2n/2] = n  

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:  

When the value of n=1, then

                                  n/2 = [1/2] = [0.5] = 1  

When the value of n=2 then  

                                   n/2 = [2/2] = [1] = 1  

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

Other Questions
ali's typing rate between 8:00 am and noon is 48 words per minute . after lunch a lunch break, Ali's typing rate between 1:00 pm and 4:00 pm is 2,040 words per hour . what is Ali's average typing rate per minute for the whole time she works? You still .......... (believe) in Santa Claus. simple present tense A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?a. Network tapb. Honeypotc. Aggregationd. Port mirror -Lab-"Why are cells so small" 31 Which of the following is the direct object in the sentence "Alicia hit her friends during a pillow fight"?t FightAliciaFriendsskip34/39 complete Pet Place sells pet food and supplies including a popular bailed hay for horses. When the stock of this hay drops to 20 bails, a replenishment order is placed. The store manager is concerned that sales are being lost due to stock outs while waiting for a replenishment order. It has been previously determined that demand during the lead-time is normally distributed with a mean of 15 bails and a standard deviation of 6 bails. The manager would like to know the probability of a stockout during replenishment lead-time. In other words, what is the probability that demand during lead-time will exceed 20 bails noun clauses,adverbal clauses,adjective clause Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto Steven has a typed copy of a contract, which he would like to have Thomas sign. Thomas, who needs glasses to read typing, doesn't want to sign until he has read the document, but Steven convinces Thomas to sign it anyway, because it is a "standard" contract for this type of situation. Is the contract which Thomas signed binding upon him? The amount of pollutants that are found in waterways near large cities is normally distributed with mean 8.5 ppm and standard deviation 1.4 ppm. 18 randomly selected large cities are studied. Round all answers to two decimal places.A. xBar~ N( ____) (____)B. For the 18 cities, find the probability that the average amount of pollutants is more than 9 ppm.C. What is the probability that one randomly selected city's waterway will have more than 9 ppm pollutants?D. Find the IQR for the average of 18 cities.Q1 = Q3 = IQR:2. X ~ N(30,10). Suppose that you form random samples with sample size 4 from this distribution. Let xBar be the random variable of averages. Let X be the random variable of sums. Round all answers to two decimal places.A. xBar~ N(___) (____)B. P(xBar 36)=E. Q3 for the xBar distribution = What is the result of 1816 2/3? Enter the result as an improper fraction and as a mixed number. What is the slope of the line with the twopoints A(-4, 8) and B(-9, 12)? U-boats were used primarily togather information about enemy movements by tracking warships.protect the German coast from attack by Allied ships and submarines.resupply troops with guns, ammunition, and food via sea rather than land.target Allied shipments on passenger ships, warships, and merchant ships. Select the correct answer.If the factors of quadratic function gare (x-7) and (x + 3), what are the zeros of function g?O A-7 and 3-7 and -3O C.3 and 7OD.-3 and 7 How did the story the sun parlor relate to the theme of forgiveness? Find the area of a triangle that has the base of 5 inches and a height of 3 3/4 inches Hydrochloric acid and sodium hydroxide can be combined to form sodium chloride and water. Which best explains the reaction? The mass of sodium hydroxide will result in the same mass of sodium chloride. The total mass of hydrochloric acid and sodium hydroxide will result in a lower total mass of sodium chloride and water. The mass of hydrochloride acid will result in the same mass of sodium chloride. The total mass of hydrochloric acid and sodium hydroxide will result in the same total mass of sodium chloride and water. Review the "Types of Distribution Channels" study material. Explain why the selection of distribution channels is essential to a successful marketing strategy. Provide an example of a well-known company's distribution channels and defend their choices. In replies to peers, agree or disagree with their assessment and justify your response. what is this story about? Disclpame, Pero esta vez soy yo. Quien hiere tus sentimientos Quien no quiere escuchar tu voz. entindeme, Perdona pero no, No estoy dispuesto a continuar, hoy termina esta relacin. Lo se no ser nada fcil Pero tambin s que no es imposible, Te juro que voy a sanar esa gran cantidad son mil de cicatrices. Te voy a olvidar, No me importa si es lo ltimo que haga, Te voy a arrancar hasta del ltimo rincn que est en mi alma, Te vas a arrepentir y lloraras por m, porque te voy a olvidar. Find the area of the smaller sector.A6 in030Area = [? ]in?BRound your answer to the nearest hundredth.