1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
2 years ago
12

What effect does the sudo iptables --policy INPUT DROP command have on the access to computing resources

Computers and Technology
1 answer:
dsp732 years ago
5 0

The effect of the sudo iptables --policy INPUT DROP command is that it gives room for system administrators to handle incoming and outgoing traffic.

<h3>What does Sudo iptables -- policy input drop command do?</h3>

The iptables -P INPUT DROP is known to be an -P switch that places the default policy on any given chain.

When the default policy on the INPUT chain changes to DROP., it implies that an incoming packet did not match one set of the rules and as such, it will have to be dropped.

Learn more about  computing resources from

brainly.com/question/14596532

#SPJ2

You might be interested in
Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
sdas [7]

Answer: satisfaction of unique business requirements

Explanation:

The word unique means : being the only one of its kind; unlike anything else. Hence, when a software is developed, it is done to meet a specific purpose which is known to the developer. So this can't be part of the above.

7 0
4 years ago
Is there a way to search your computer for all music files on it?
Slav-nsk [51]
Yes their is a way go to your downloads see if you have some thing or their shall be something that you can type in your computer and find something or you can go to Youtube or google and they can show you a video or some articles.
5 0
4 years ago
Which of the following information should be included in audit documentation? a. Procedures performed. b. Audit evidence examine
irinina [24]

Answer:

This standard establishes general requirements for documentation the auditor should prepare and retain in connection with engagements conducted pursuant to the standards of the Public Company Accounting Oversight Board (\"PCAOB\"). Such engagements include an audit of financial statements, an audit of internal control over financial reporting, and a review of interim financial information. This standard does not replace specific documentation requirements of other standards of the PCAOB.

Explanation:

hope this helps

you out ok

and have a blessed day

Your welcome

8 0
3 years ago
What's a False statement about online time? A. Blue light from devices can make it hard to sleep. B. It's a good way to connect
mylen [45]

Answer:C

Explanation: This has no basis while the others have studied behind them.

4 0
4 years ago
Define
3241004551 [841]

Computational thinking- the thought processes involved in formulating a problem and expressing its solution(s) in such a way that a computer—human or machine—can effectively carry out. Computational Thinking is an iterative process based on three stages.

Problem solving process- The process of working through details of a problem to reach a solution. Problem solving may include mathematical or systematic operations and can be a gauge of an individual's critical thinking skills.

Data- facts and statistics collected together for reference or analysis.

Information- facts provided or learned about something or someone.

Algorithm- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Aggregate data- aggregate data are data combined from several measurements. When data are aggregated, groups of observations are replaced with summary statistics based on those observations. In a data warehouse, the use of aggregate data dramatically reduces the time to query large sets of data.

Discovery Data- in the context of IT, is the process of extracting actionable patterns from data. The extraction is generally performed by humans or, in certain cases, by artificial intelligence systems.



3 0
3 years ago
Other questions:
  • Google wallet software utilizes android phones with near field communication technology, such as _____, to allow shoppers to swi
    12·1 answer
  • 3) Write a program named Full_XmasTree using a nested for loop that will generate the exact output. This program MUST use (ONLY)
    6·1 answer
  • The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of
    9·1 answer
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • When creating a mail merge, you must insert all of the items from your data source into your merged document. Truth or false ?
    6·2 answers
  • A pizza delivery restaurant decides to stop hiring drivers and start hiring cyclers to deliver its pizza. The restaurant thinks
    15·1 answer
  • Which of the following allows you to copy
    15·1 answer
  • Guys is there a way to watch manga in colour for free
    13·1 answer
  • Which of the following is NOT a media file? *<br> .wav<br> .mp4<br> .exe
    10·1 answer
  • A ________ implementation involves considerable modifications to the erp software
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!