1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
1 year ago
7

does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?

Computers and Technology
1 answer:
Kryger [21]1 year ago
5 0

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

You might be interested in
A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa
Alekssandra [29.7K]

Answer:

subtotal function

Explanation:

The Microsoft Excel SUBTOTAL returns the subtotal of the numbers in the columns in a list or database, and it can be applied horizontally as well as vertically. And the SUBTOTAL function happens to be the built-in function in Excel which is categorized as the Math function or the Trigger function. And like a worksheet function, it can be inserted as a part of the formula inside a cell of a worksheet. Select the columns in a row, or rows in a column, and move to the Data tab in the ribbon. From there,  select the SUBTOTAL, and the function you would like to use, and press ok. And this means here the correct option is the subtotal function.

6 0
2 years ago
When you merge business letters, how many total documents will you have when you are finished with the merge process?
dlinn [17]

Answer:

You will have one letter for every receiver on the table.

Explanation:

In a new Microsoft Word paper, click on the Mailings label, and in the Start Mail Merge collection, agree on Start Mail Merge.

Agree on Step-by-Step Mail Merge Wizard.

Choose your paper model.

Choose the opening paper.

Preferred beneficiaries.

Address the report and attach your custom entries.

6 0
3 years ago
Read 2 more answers
Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,050,
cluponka [151]

Answer:

a. 18102

b. 5656

c. 6090

Explanation:

Pleaae kindly check attachment for the detailed and step by step solution of the given problem.

7 0
3 years ago
A project manager is working with a software development group to collect and evaluate user stories related to the organization’
MA_775_DIABLO [31]

Answer:

Answer: C Scrum

Explanation:

Answer: C Scrum would BEST support this objective, to collect and evaluate user stories related to the organization’s internally designed CRM tool.

3 0
3 years ago
An instance variable name of type String, initialized to the empty String. An instance variable score of type int, initialized t
timofeeve [1]

Answer:

public class Class {

   private String name ="";

   private int score = 0;

   //Method SetName

   public void setName(String newName){

       name = newName;

   }

//Method SetScore

   public void setScore(int newScore){

       score = newScore;

   }

//Method GetName

   public String getName() {

       return name;

   }

//Method GetScore

   public int getScore() {

       return score;

   }

}

Explanation:

  • The class called Class is implemented in Java programming language
  • It has two fields (instance variables name and score)
  • Methods for setting the values of variables (mutator methods) or setters
  • Methods for getting the values of the variables (accessor methods) getters
8 0
3 years ago
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • When are number list generally used ?
    10·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative intege
    10·1 answer
  • Which type of virus includes protective code that prevents outside examination of critical elements?
    14·1 answer
  • What soft ware can you use to erase all of your data from a hard drive safely
    13·1 answer
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • What is this....... Iam booking train to patna. ​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!