1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
2 years ago
12

Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par

t of the process
Computers and Technology
1 answer:
tino4ka555 [31]2 years ago
5 0

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

You might be interested in
Who are the founders of video-sharing site Dailymotion?
Pavlova-9 [17]

In March 2005, Benjamin Bejbaum and Olivier Poitrey founded the Dailymotion website from the living room of Poitrey's apartment in Paris. Six individuals pooled together €6,000 ($9,271 USD) to start the business. In September 2006, Dailymotion raised funds in collaboration with Atlas Ventures and Partech International. They raised 7 million euros which was considered to be the most funds raised in 2006 from the French Web 2.0. In October 2009, the French government invested in Dailymotion through the Strategic Investment Fund. On 25 January 2011, Orange acquired a 49% stake in Dailymotion for €62 million, valuing the company at €120 million.[6]


4 0
3 years ago
A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD inclu
Snowcat [4.5K]

Answer: • Ensure that the video card is compatible with the expansion slot

• Install video drivers from CD and then install updated drivers from the internet

• Configure the PC to use the integrated graphics if available and needed

Explanation

Your question isn't complete as you didn't put the options but I got the options online and the correct answers have been provided.

The installation and configuration for the high-end video card suitable for gaming will include:

• Ensure that the video card is compatible with the expansion slot

• Install video drivers from CD and then install updated drivers from the internet

• Configure the PC to use the integrated graphics if available and needed

4 0
3 years ago
3. What report shows what mobile devices were used to view a website?
mrs_skeptik [129]

The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

<h3>What is a mobile device?</h3>

This is known to be a is a small hand-held device that shows screen with touch input and it is said to be also made up of QWERTY keyboard as well as others.

Note that The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

See full question below

What report shows what mobile devices were used to view a website?

The Exit Pages report under “Site Content”

The Landing Page report under “Site Content”

The Engagement report under “Behavior”

The Devices report under “Mobile”

Learn more about website from

brainly.com/question/13171394

#SPJ12

4 0
2 years ago
When writing HTML code, what is meant by 'syntax'?​
aleksandrvk [35]

Answer:

   Syntax is essentially the punctuation and grammar rules for a computer language.

Explanation:

  Certain characters and words have special meanings and must appear in a particular order for the computer code to make any sense. A simple example from line 3 in Figure 2.2 is the piece of HTML code <head>.

8 0
3 years ago
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
tankabanditka [31]
D. Solid state is correct
5 0
3 years ago
Other questions:
  • ) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Ans
    12·1 answer
  • David uses Office Excel 2013 to calculate his average marks. He enters a formula in cell B5 to calculate the average based on th
    11·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • A _____ are devices that permit a user to connect to a digital t-carrier service.
    6·1 answer
  • A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, wh
    11·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • What is the working principle of computer?​
    10·1 answer
  • What is Japanese tradition?
    8·2 answers
  • How many bytes/second is a 16Mbps cable modem connection?
    9·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!