An arithmetic average is known as the ____.

A. mean
B. median value
C. mode
D. midpoint


Answer: A

Computer Science & Information Technology

You might also like to view...

____________________ assurance is the other side of the security assurance coin.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Write a function that finds and removes the second occurrence of a given string in a passed string.

Note: An answer could make use of a variety of techniques (such as looping through the string in some way), but the easiest way is to make use of the find method and making a substring.

Computer Science & Information Technology

The _______ command is used to move around in the directory structure

Fill in the blank(s) with correct word

Computer Science & Information Technology

You notice a range of network problems affecting your company's proxy server. After reviewing the logs, you notice that the firewall is being targeted with various web attacks at the same time that the network problems are occurring. Which strategy would be MOST effective in conducting an in-depth assessment and remediation of the issue?

A. 1. Deploy a network fuzzer on the switch span port. 2. Adjust the external facing IPS. 3. Reconfigure the proxy server to block the attacks. 4. Verify the firewall is configured correctly and hardened. B. 1. Deploy an HTTP interceptor on the switch span port. 2. Adjust the external facing NIDS. 3. Reconfigure the firewall ACLs to block all traffic above port 2000. 4. Verify the proxy server is configured correctly and hardened. 5. Review the logs weekly in the future. C. 1. Deploy a protocol analyzer on the switch span port. 2. Adjust the external facing IPS. 3. Reconfigure the firewall ACLs to block unnecessary ports. 4. Verify the proxy server is configured correctly and hardened. 5. Continue to monitor the network. D. 1. Deploy a protocol analyzer on the switch span port. 2. Adjust the internal HIDS. 3. Reconfigure the firewall ACLs to block outbound HTTP traffic. 4. Reboot the proxy server. 5. Continue to monitor the network.

Computer Science & Information Technology