A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)A. human resource policies and procedures for all employees in the companyB. documentation of the current physical and logical topologies *C. analysis of the network traffic based on protocols, applications, and services used on the network*D. history and mission statement of the companyE. inventory of the devices that are currently used on the network*F. listing of the current employees and their role in the company

Answers

Answer 1
Answer:

Answer:

Option B,C,E

Explanation:


Related Questions

7) Which of the following factors determines the structure, features, and functions of an information system used in a company? A) the competitive strategy B) the value of its brands C) the size of the company D) the technology used by competitors
Scarlett is unable to repay her loan on time due to some personal problems. she informs the financial institution and asks for some more time to repay the loan. however, the financial institution sends its agents to scarlett’s office. these agents insult her in public. which law has the financial institution violated?
What type of relationship involves people who don't share the same status
Why would a team choose to employ a zone defense over a person to person defense?
During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?

An accompanying ____ gives audience members reference notes and review material for your presentation.

Answers

The answer to the blank is "handout".

Therefore, the complete sentence is "An accompanying handout gives audience members reference notes and review material for your presentation."

In making presentations, handout refers to the printed papers with the reference of your reports.

The two basic kinds of transistor circuits are amplifying and switching. A. True B. False

Answers

Answer: false

Explanation:

For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu option should she use

Answers

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

Answer: A - smartart

Explanation:

What is the keyboard shortcut Ctrl+Z used for?

Answers

The keyboard shortcut Ctrl + Z is used to undo your last action.
The Keyboard shortcut Ctrl+Z is just the Undo command.

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a webbrowser. Which service delivery model is Kaira's company using?

Answers

Answer:Software as a Service (SaaS)

Explanation: Software as a service(SaaS) is the software model that consist of the services don by it in the distributed form. There is presence of the third party or external factor that helps in providing the internet with the users It is the widely used in the area of cloud computing.

Kaira's company is also tending to used the software as service model(SaaS) for their company to maintain the connection of the system's host and employees.

If privileges are greater than those already available to the attacker the result is a _________.

Answers

Answer:

privilege escalation

Final answer:

When an attacker gains privileges greater than what they already have, it's called privilege escalation. Both vertical (becoming a superuser) and horizontal (getting privileges of a peer) are serious security risks.

Explanation:

If privileges are greater than those already available to the attacker, the result is a privilege escalation. In terms of computer security, privilege escalation means that a user receives privileges they are not entitled to. These privileges can be used to delete files, view private information, or even take control of the system. It can occur in two ways: vertical privilege escalation, also known as becoming the superuser, whereby a user can get rights reserved for a user with higher privileges. Horizontal privilege escalation, on the other hand, is when a user is able to acquire the same privileges as another user. In both cases, it represents a serious security risk.

Learn more about Privilege Escalation here:

brainly.com/question/34644252

#SPJ11