as a security analyst, you have discovered the victims of an malicious attack have several things in common. which tools would you use to help you identify who might be behind the attacks and prevent potential future victims?

Answers

Answer 1

As a security analyst, the tools that you could use to help you identify who might be behind the attacks and prevent potential future victims are:

Mitre AttacksDiamond Model of Intrusion Analysis

How does intrusion analysis work?

A network intrusion analysis will identify the attack's progression from the point where the attacker scans your network, through the exploitation of a vulnerability (or set of vulnerabilities), through the actions taken after the exploitation, such as communications.

Therefore, Cyber attacks are modeled using the Diamond Model of Intrusion Analysis. It is divided into four sections: target, capability, infrastructure, and opponent. It offers analysts a thorough view of cyberattacks.

Learn more about security analyst from

https://brainly.com/question/13179611
#SPJ1


Related Questions

The command used to save a file for the first time and or to save a file with a new file name, location and formatT

Answers

cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy

5. List three safety concerns when using hand
ertain safety
tools.

Answers

Answer:

Inspect regularly. ...

Wear gloves. ...

Carry with care. ...

Don't pocket sharp objects. ...

Be aware of your surroundings. ...

Use the right tools.

What is the worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack, and why? All stack operations are always 0(1). Odlog N), to find the correct location to add the element O(N), to find the correct location to add the element. O(N), to copy all elements to a larger list when the stack is full.

Answers

The worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack is O(1). Here is why:Stacks use LIFO (last-in, first-out) to manage data structures.

A linked-list-based, unlimited-capacity stack, in particular, is implemented by linking nodes or data elements in a sequence in which every node or element points to the next one, thereby enabling unlimited data storage.The reason why the worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack is O(1) is because all stack operations are always 0(1).

This is the best scenario for the implementation of the linked-list-based, unlimited-capacity stack. Even though the average case complexity of adding an element to a linked-list-based, unlimited-capacity stack may be higher than the worst-case complexity, the worst-case complexity remains O(1).In addition, the other options provided such as O(log N) and O(N) are not applicable for linked-list-based, unlimited-capacity stacks. The operation of adding an element to a linked-list-based, unlimited-capacity stack is not dependent on any logarithmic or linear time complexities.

To know more about complexity visit:

https://brainly.com/question/31836111

#SPJ11

analyze and compare the access control models in terms of how access control lists (acl) are written and determine which statement accurately explains the discretionary access control (dac) model.

Answers

The statement that  accurately explains the discretionary access control (dac) model.

A DAC model is the most flexible and weakest access control model. The owner has full control over the resource and grants rights to others.

What is DAC in cyber security?

A model of access control called discretionary access control (DAC) assumes that the owner of the resource in issue decides who has access to it. The resource's owner has the authority to decide who is granted access and under what conditions. In Microsoft operating systems, we can see DAC implemented.

The concept of limiting access to things based on the identity of the subject is known as discretionary access control (the user or the group to which the user belongs). Access control lists are used to implement discretionary access control.

Therefore, The most adaptable and vulnerable access control model is the DAC model. The resource is completely under the owner's control, and rights may be granted to others.

Learn more about access control models from

https://brainly.com/question/14014672
#SPJ1

when a single network server can't handle all the data processing requests, more servers can be added and joined together to create a . choose all that apply, then click done.

Answers

what are the answer choices??

Kris is the project manager for a large software company. Which part of project management describes the overall project in detail? Analysis report Resources document Scope Scope creep

Answers

Answer:

The given option "Resource document" is the correct answer.

Explanation:

Whenever it applies to chronology as either the documentation a resource records collection of specific documents should indeed be regarded as a component of this kind of record. The resource component encompasses a series of proclamations provided by the researcher including its memorandum, and therefore is willing to take responsibility for each other by the very same body is nonetheless accountable again for the file.

The remaining three options do not apply to something like the specified scenario. And the latter is the correct one.

Answer:

Resource document

Explanation:

What three blocks of addresses are defined by RFC 1918 for private network uno? (Choose three)
1. 10.0.0.0/8
2. 239.0.0.0/8
3. 169.254.0.0/16
4.100.64.0.0/14 05.
5. 172.16.0.0/12
6.192.168.0.0/16

Answers

The three blocks of addresses defined by RFC 1918 for private network uno are:
1. 10.0.0.0/8
2. 172.16.0.0/12
3. 192.168.0.0/16


What is RFC 1918?

RFC 1918 refers to a set of guidelines established by the Internet Engineering Task Force (IETF) that define a range of private IP address blocks to be used within a private network. These private IP address ranges are not globally routable, meaning that they are not meant to be used on the public internet. Instead, they are reserved for internal use within a private network to facilitate communication between devices without requiring public IP addresses. The three private IP address ranges defined by RFC 1918 are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Learn more about RFC 1918: https://brainly.com/question/12950573

#SPJ11

Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?

Answers

Answer: 0

Explanation: 1/2

Answer:

a

Explanation:

Hispaniola is an island in the West Indies Caribbean Sea that contains two separate countries name these two c

Answers

The two countries on Hispaniola island are Haiti and the Dominican Republic make up Hispaniola. This is the second-largest in land area in the Caribbean Sea.

What is Hispaniola island?

There are numerous islands in the Caribbean, sometimes referred to as the West Indies. the Caribbean islands mentioned There are three primary island groupings scattered across a sea that covers an area of 91,000 square miles between Venezuela and Florida:

The Bahamas, the Lesser and Greater Antilles. Following the island of Cuba in terms of area, Hispaniola is the most populated island in the West Indies.

Therefore, the two countries are Haiti and the Dominican Republic.

To learn more about Hispaniola island, refer to the link:

https://brainly.com/question/8159442

#SPJ1

If a change is made to the active
cell, what type of cell will also
change?
Precedents
Dependents

Answers

Answer:

precedents

Explanation:

How can a user access the Mailbox Cleanup tools?

Start a new AutoArchive.

Enter the Backstage view.

Left-click the Inbox folder.

Open the Deleted Items folder.

Answers

Answer:

Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.

Explanation:

Answer: B: enter backstage view

Explanation:

I took the test. Plz mark me brainliest!

You are the IT administrator for a small corporate network. The computer in Office 2 recently failed, and you replaced the hard drive. You would like to download and re-image the workstation from the network. In this lab, your task is to complete the following: Turn on the computer in Office 2.
Configure the Integrated NIC in the BIOS for PXE.
Boot the computer and install the Window 10 image.
Verify that the new image is working on Office2.

Answers

To activate the Office 2 computer, confirm its secure connection to a power supply and press the power switch.

What next should be done?

After turning on the computer, you can enter the BIOS configuration by pushing the assigned button (typically Del, F2, or F10) while the system boots up.

Find the Integrated NIC setup in the BIOS and select the option to boot from PXE. Record the modifications and depart from the BIOS settings.

The network will now be used for booting the computer and commencing the process of installing the Windows 10 image. Once the installation process is completed, it is essential to confirm that the new image is functioning accurately on Office 2

Read more about IT admin here:

https://brainly.com/question/30456614

#SPJ1

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she take? Choose the correct answers from the drop-down menus.

1. First, select the_____.
a. review tab
b. object on the slide
c.new comment button
2. Go to the_____ tab.
a. home
b. insert
c. review
3. Click New Comment, and type in the observation.

4. The comment will appear in the Comment pane on the_________ of the slide.
a. top
b. bottom
c. left side
d. right side

Answers

Answer:

1. b.

2. c.

4. d.

Explanation:

Answer: object, review, right side

Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete

Answers

The answer is D complete I believe

I'm not sure how to do these. By the way, it has to be python.

I'm not sure how to do these. By the way, it has to be python.

Answers

Task 1:

float75 = float(75)

string75 = "75"

# you cannot add together a number and a string because a string has no inherent numerical value like a number does.

Task 2:

num = float(input("Enter a number"))

print(num**2)

Task 3:

num = int(input("Enter an integer: "))

print("When you divide "+str(num)+" by 7, the quotient is "+str(num//7)+" and the remainder is "+str(num%7)+".")

Task 4:

gigs = int(input("How many gigabytes does your flashdrive hold? "))

print("A flashdrive with "+str(gigs)+ " gigabyte(s) holds "+str(gigs*8589934592)+" bit(s).")

For task 4, you might have to change the number 8589934592 to something else. I'm not entirely sure how many bits are in a gigabyte. I hope this helps though.

what do we call goods that are no longer available once you have used them??​

Answers

Answer:

Either limited sources or extinct

Explanation:

Natural resources are things that can easily be replaced by nature. Limited resources are something that cannot be replaced by nature <33

Limited sources should be the answer

What’s 9- 4 x y + 44 - -8
and what is 77 - 1.3 + -22

Answers

Answer:

1. -4y + 61

2. 53.7

enter your entire script below. do not include statements to drop objects as your script will be executed against a clean schema. you may include select statements in sub queries in your insert statements, but do not include select queries that return records for display. continue to use the purchase 61 and purchase item 61 tables that you created and modified in the previous problems. increase the shippping cost of every purchase from manufacturers in massachusetts ('ma') by 10%. round your calculations to two decimal points. hint: use the in clause. do not use a join

Answers

UPDATE purchase61

SET shipping_cost = ROUND(shipping_cost * 1.10, 2)

WHERE manufacturer IN (SELECT manufacturer FROM purchaseitem61 WHERE state = 'MA')

How to update the column?

This statement will update the shipping_cost column in the purchase61 table for every purchase where the manufacturer is in the list of manufacturers in Massachusetts, as determined by the subquery. The shipping cost will be increased by 10% by multiplying it by 1.10, and then rounded to two decimal points using the ROUND function.

Note that you should not use a join in this statement, as the IN clause allows you to compare values in the manufacturer column with the results of the subquery without using a join.

This can make the statement more efficient and easier to read.

To Know More About SQL, Check Out

https://brainly.com/question/13068613

#SPJ1

Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hint: the original letters were shifted,for example if it is shifted by 1 that means Z becomes A , A becomes B, etc. You need to know the number of shifts)

Answers

Answer:

Zoom, Zoom, Zoom We’re going to the moon. If you want to take a trip, Climb aboard my rocket ship.

Explanation:

I got it. This is a caesar cipher with 3 shifts.

Which of the following correctly stores 45 squared in the variable x?

Which of the following correctly stores 45 squared in the variable x?

Answers

Answer:

x = 45

x = x ** 2

The option that correctly stores 45² in the variable of x is;

Option B;

x = 45

x ** 45

This is a python problem.

In python, the symbol ** simply means the number after it is an exponent of the number before the symbol.

In contrast, the symbol * in python simply means product or multiplication.

Thus, in python; a**b simply means \(a^{b}\)

In contrast; a*b simply means a × b.

Now, let us apply that concept to our question;

We are given; x = 45

We want to store 45² in the variable of x.

This means 45² will be written as x²

However, we want to write it in python form. Thus, this will give us;

x = 45

x ** 45

Read more at; https://brainly.in/question/20737184

An application lets you search what you see, get things done faster and understand the world around you – using just your camera or a photo. Which domain does this app belong to?.

Answers

The application described, which allows users to search what they see and utilize their camera or a photo, belongs to the domain of "Visual Search" or "Image Recognition."

Visual Search or Image Recognition applications utilize computer vision technology to analyze and understand images or scenes captured by a camera or uploaded as photos. These applications enable users to search for information, products, or objects by simply taking a picture or using the camera to scan the surroundings. The app mentioned in the question leverages the camera or photo capabilities to provide search functionality, enhance productivity, and provide insights about the world based on visual input. Examples of such applications include image-based search engines, visual shopping tools, augmented reality applications, and visual translation apps.

To know more about camera click the link below:

brainly.com/question/14292643

#SPJ11

in the event of a server hard disk failure, you have been asked to configure server hard disks as depicted below. what type of disk configuration is this?

Answers

Which risks will have a greater overall influence on business operations is determined through a business impact study. This is helpful in figuring out how to recover after a catastrophe.

What is the practice of a hacker searching through the trash for information known as?

Dumpster diving is the practice of looking through trash to find information. The garbage can be in a public dumpster or at a place that is off-limits and requires illicit access. Dumpster diving relies on a flaw in people: a lack of security awareness.

What is it known as when a hacker uses botnets to quickly shut down a number of services?

A single computer is used in a Denial of Service (DoS) attack to either target a software vulnerability or to saturate a specified resource with packets, requests, or queries. However, a DDoS attack makes use of numerous linked devices and is frequently carried out by botnets or, occasionally, by individuals who have planned their actions in advance.

to know more about server hard disks here:

brainly.com/question/28874406

#SPJ4

12. Fill in the blanks: In a ____________, the root of the tree is labeled _______________, children of the root are the names of _______________, and the leaves designate ___________. These trees help generate ____________ used to evaluate architectural alternatives. g

Answers

Based on the description of the tree, the missing words are:

Binary tree. Root node. Internal nodes. External node.Structure.

What are the parts of a binary tree?

In a Binary tree, the roots are called the root nodes and the children of those roots are called the internal nodes.

The leaves are meant to designate the external nodes. These trees are helpful in evaluating architectural alternatives because they provide structure.

Find out more on binary trees at https://brainly.com/question/14990156.

Soft skills high module 7

Answers

Yes this is the fight answer I hope it helps

how to plot 401k plan in matlab

Answers

To plot a 401k plan in MATLAB, you would first need to gather the data for the plan. This could include information such as the starting balance, contributions made over time, and any interest or gains earned on the account.

Plotting a 401k plan in Matlab can be done by following these steps:

Import the data: You can import your 401k plan data into Matlab using the 'import data' function.

Organize the data: Organize the data in a way that makes sense for plotting. This may include separating the data into columns or creating separate variables for each data point.

Create a figure: Use the 'figure' command to create a new figure in Matlab.

Plot the data: Use the 'plot' command to create a line plot of your 401k plan data. You can add labels to the x and y-axis and a title to the plot to make it easier to understand.

Customize the plot: You can customize the plot by changing the line style, color, and thickness. You can also add markers to the plot to highlight specific data points.

Save the plot: Use the 'saveas' function to save the plot as an image file.

By following these steps, you can create a clear and informative plot of your 401k plan in Matlab. The resulting plot can be used to analyze trends in your retirement savings and make informed decisions about your financial future.

To learn more about MATLAB:

https://brainly.com/question/13974197

#SPJ11

jane has been asked to investigate a method that would ensure email traffic gets priority on the corporate network. she would need to implement ?

Answers

Trevor should employ NTP technology to make sure that some traffic receives priority over other traffic.

To synchronize with networked computer clock time sources, one uses the Network Time Protocol (NTP) internet protocol. One of the initial parts of the TCP/IP suite, it is a component. NTP is the name of both the protocol and the client-server computer systems. A network of computers is time-synchronized using the Network Time Protocol (NTP) technology. NTP makes use of User Datagram Protocol (UDP), an IP-based protocol. NTP Version 3 documentation can be found in RFC 1305. This module explains how to configure Network Time Protocol on Cisco gear. Trevor should employ NTP technology to make sure that some traffic has precedence over other traffic so that the most crucial traffic gets through even when there is congestion.

Learn more about NTP here:

https://brainly.com/question/29554810

#SPJ4

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

In this lesson, you surveyed different types of engineering and products and learned that the concept development process was adapted to meet the needs and requirements of each. For this assignment, identify the customer needs in a market for which you want to design and develop a product. Use the concept development and testing process to explain how you would choose a product idea that would meet your customer’s expectations, be cost effective, and could be developed and manufactured in a timely manner.

For the product or project that you choose, write a short essay (two-three pages) or create a short audio report (three-five minutes) . Set a theme for the essay, state your goal for the product, support it with your basic knowledge of engineering and the product development lifecycle, and express a conclusion. Include at least three sources listed on a reference page at the end of the essay.

The essay or report should:

Address every step of the concept development process.
Identify the types of engineering that would be used to develop the product.
End with a short conclusion based on what you believe the outcome would be if you followed the product development life cycle process.
Submission Requirements

Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make the information easy to understand.
Save an audio report in MP3 format.

Answers

Answer:

Theme: Developing a Solar-Powered Water Pump for Rural Communities

Goal: The goal of this project is to design and develop a solar-powered water pump that meets the needs of rural communities in developing countries. The product should be cost-effective, efficient, and easy to maintain.

Introduction:

Access to clean and safe water is essential for human survival. In rural areas of developing countries, many communities still lack access to reliable water sources. The lack of water has a significant impact on the health, education, and economic development of these communities. To address this issue, we propose the development of a solar-powered water pump that is both cost-effective and efficient. This essay will detail the steps involved in the concept development process, the types of engineering involved in developing this product, and our conclusion based on the product development lifecycle.

Step 1: Identify Customer Needs

The first step in the concept development process is to identify the customer's needs. For this project, the primary customer is rural communities in developing countries. To identify their needs, we conducted extensive research on the challenges they face in accessing water. Our research showed that the communities need a water pump that is reliable, easy to maintain, and affordable. They also need a water pump that can be powered by renewable energy sources such as solar power.

Step 2: Generate Ideas

The next step is to generate ideas for the product. We brainstormed various ideas based on the customer's needs and the available technology. We identified the most promising idea as a solar-powered water pump that can operate in remote areas without access to electricity.

Step 3: Evaluate and Select Ideas

The third step is to evaluate and select the most promising idea. We evaluated the feasibility of the solar-powered water pump idea by considering the cost of materials, the efficiency of the pump, and the ease of maintenance. We selected the idea because it met all of the customer's needs, was cost-effective, and could be easily maintained.

Step 4: Develop and Test Concepts

The fourth step is to develop and test the concept. We developed a prototype of the solar-powered water pump and tested it in a remote rural community. The pump was able to draw water from a deep well and pump it to a storage tank using only solar power. The pump was also easy to install and maintain.

Step 5: Refine and Finalize Concepts

The fifth step is to refine and finalize the concept. We made some improvements to the prototype based on the feedback we received from the rural community. We added a filter to remove impurities from the water and made the pump more durable to withstand harsh weather conditions.

Types of Engineering:

The development of the solar-powered water pump involved different types of engineering. The mechanical engineering team designed the pump, while the electrical engineering team designed the solar panels and battery system. The civil engineering team designed the storage tank and the plumbing system. All three engineering teams worked together to ensure that the product was efficient, reliable, and easy to maintain.

Conclusion:

In conclusion, the development of a solar-powered water pump is a promising solution to the water crisis faced by rural communities in developing countries. The concept development process allowed us to identify the customer's needs, generate ideas, evaluate and select the most promising idea, develop and test concepts, and refine and finalize the product. By involving different types of engineering, we were able to design a product that is cost-effective, efficient, and easy to maintain. If we followed the product development lifecycle process, we believe that the outcome would be a successful and sustainable product that meets the needs of rural communities.

Which type of database application is considered more vulnerable and therefore has more strict security requirements for a business?.

Answers

A database application is considered more vulnerable to attacks if it has loose security controls. A database management system is software that enables users to store, access, manipulate, and analyze data in a secure manner.

According to recent surveys, over 80% of data breaches are caused by weak, stolen, or compromised passwords. It is critical to secure the database management system to prevent access by hackers or other unauthorized users. There are two types of database applications: web-based and client-server applications.Web-based database applications are accessible via the internet and are, therefore, more susceptible to attacks than client-server applications. Client-server applications require a client to access the database.

They are stored on a centralized server and are secured behind a firewall. Client-server applications are designed to offer improved security to the users, thereby making them less vulnerable to attacks than web-based applications.Web-based applications are vulnerable to several types of attacks, such as SQL injection attacks, cross-site scripting, and cross-site request forgery. Therefore, web-based database applications are considered more vulnerable and have stricter security requirements for businesses that rely on them.

To know  more about security visit:

https://brainly.com/question/32133916

#SPJ11

Other Questions
A fee paid by the policyholder at regular intervals to the insurer for insurance.Select one:a. Premiumb. Deductiblec. Insuranced. Payment Which example is an example of irony? For each example, write whether it is Ethos, Pathos, or Logos. Explain why. 1. "Our expertise in roofing contracting is evidenced not only by our 100 years in the business and our staff of qualified technicians, but in the decades of satisfied customers who have come to expect nothing but the best." 2. "Ladies and gentlemen of the jury: we have not only the fingerprints, the lack of an alibi, a clear motive, and an expressed desire to commit the robbery We also have video of the suspect breaking in. The case could not be more open and shut." 3. "If youre still unsure, please consider that my advanced degree and field work speak for themselves." 4. "More than one hundred peer-reviewed studies have been conducted over the past decade, and none of them suggests that this is an effective treatment for hair loss." 5. "Its a matter of common sense that people deserve to be treated equally. The Constitution calls it self-evident. Why, then, should I have been denied a seat because of my disability?" 6. "Dont be the last person on the block to have their lawn treated you dont want to be the laughing stock of your community!" 7. "Youll make the right decision because you have something that not many people do: you have heart." 8. "As a doctor, I am qualified to tell you that this course of treatment will likely generate the best results." 9. "My three decades of experience in public service make me the ideal candidate for your mayor." 10. Theyve worked against everything weve worked so hard to build, and they dont care who gets hurt in the process. Make no mistake, theyre the enemy." 11. "You dont need to jump off a bridge to know that its a bad idea. Why then would you need to try drugs to know if theyre damaging? Thats plain nonsense." 12. "The data is perfectly clear: this investment has consistently turned a profit year-overyear, even in spite of market declines in other areas." 13. "The algorithms have been run in a thousand different ways, and the math continues to check out." 14. "Theres no price that can be placed on peace of mind. Our advanced security systems will protect the well-being of your family so that you can sleep soundly at night." 15. "Better men than us have fought and died to preserve this great nation. Now is our turn to return the favor. For God and country, gentlemen!" 16. "He is a forensics and ballistics expert for the federal government if anyones qualified to determine the murder weapon, its him." This is for Theater can someone help me? find the value or measure. Assume all lines that appear to be tangent are tangent. CD= How do you spell AOT in Japanese? 6th grade math help me pleaseee a foreign-made household appliance is popular and is highly competitive with the same product manufactured domestically. to give the domestic industry a better chance to operate profitably, the government restricts the number of these appliances that can be imported by applying a(n) . Julie is cycling at a speed of 3.4 meters/second. If the combined mass of the bicycle and Julie is 30 kilograms, what is the kinetic energy?A. 1.7 102 joulesB. 1.5 102 joulesC. 2.0 102 joulesD. 2.2 102 joules How did the fact that justice marshall was a federalist influence his ruling in the mcculloch case?. Determine the general series solution for the differential equation xy+xy4y = 0 up to the term x^2. For the polynomial h(x) below. -1 is a zero. Find the other zeros of h(x).h(x) = x^3 - x^2 - 3x - 1 true/false. countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence Read the passage, and then answer the question that follows:Even though it costs less than staying in hotels, family camping has become less popular lately.In the passage above, how is the transition even though used?A. To show a contrastB. To summarize an ideaC. To introduce an ideaD. To show a comparison The flow of blood is ______________ A. Directly related to the pressure gradient but inversely related to the resistance B. Inversely related to both the pressure gradient and the resistance C. Inversely related to the pressure gradient but directly related to the resistance. D. Directly related to both the pressure gradient and the resistance. Product of two rational no. is 1 , if one of them is / , then the other no. is a) b) -1 c) 0 A company offers courses to prepare students for the Graduate Management Admission Test (GMAT) has the following information about its customers: 20% are currently undergraduate students in business; 15% are undergraduate students in other fields of study; 60% are college graduates who are currently employes; and 5% are college graduates who are unemployeed. Choose a customer at random. If a student is not an undergraduate business student, what is the robability they are an undergraduate student in other feilds of study? Ok What is the significance of the Wannsee Conference of 1942 ? I don't know the answer please tell me the correct one 21. A virus reproduces by tripling every half hour. If a single virus gets into your system and continues at this rate, how much of it will be in your system after a 24-hour period. (Hint: there would be two instances of tripling after the first hour) 24 hoursPlease this is urgent need within 20-30 mins