1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
1 year ago
13

with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg

ates that traffic from other packets on the internet. group of answer choices ldp mpls lsp tunnel vpn
Computers and Technology
1 answer:
GenaCL600 [577]1 year ago
6 0

With option A: IDP the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segregates that traffic from other packets on the internet.

<h3>What in security is IdP?</h3>

A system that produces, maintains, and manages digital IDs is known as an identity provider (IdP). The IdP has two options for user authentication: directly through the user, or indirectly through third-party service providers (apps, websites, or other digital services). IdPs provide user authentication as a service, to put it simply.

Note that A system component known as an identity provider (IdP) gives an end user or internet-connected device a single set of login credentials that guarantee the entity is who or what it claims to be across several platforms, apps, and networks.

Learn more about An identity provider from

brainly.com/question/29024344
#SPJ1

You might be interested in
During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
Paraphin [41]

Answer:

C. Man-in-the-middle; well-controlled storage of private keys.

Explanation:

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.

5 0
3 years ago
Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults
BARSIC [14]

Answer:

if (age < 18)  // check condition of variable age is less than 18

minors=minors+`1;

else if (age >=18 && age <=64)  //check condition of variable age between 18 to 64

adults=adults+1;

else  // check condition of variable age more than 65

seniors=seniors+1;

Explanation:

Here we checks the condition if the  variable age is less than 18 then it increment the value of variable 'minors' by 1  i.e, minors=minors+`1; .

if variable age is 18 through 64 then it increment the value of variable adults by 1 i.e,'adults'=adults+1;  otherwise increment the value of variable 'seniors ' by 1  i.e seniors=seniors+1;

3 0
4 years ago
Write a program that reads in 10 numbers and displays the number of distinct numbers and the distinct numbers in their input ord
Alla [95]

Answer:

Explanation:

The following code is written in Python. It creates a for loop that iterates 10 times, asking the user for a number every time. It then checks if the number is inside the numArray. If it is not, then it adds it to the array, if it is then it skips to the next iteration. Finally, it prints the number of distinct numbers and the list of numbers.

numArray = []

for x in range(10):

   num = input("Enter a number")

   if int(num) not in numArray:

       numArray.append(int(num))

print("Number of Distince: " + str(len(numArray)))

for num in numArray:

   print(str(num), end = " ")

8 0
3 years ago
Make the correct match.
faltersainse [42]
<span>1. E 2. B 3. D 4. F 5. C 6. A Let's go about solving this problem in a process of elimination. So I'll be making each match in the easiest (for me) order. Initially I'm not sure about 1 & 2. But the match for #3 is rather obvious. So 3. Blending non-related clips and images to make a new video. This is a "D. Mashup" The next obvious answer is for #6. That is 6. Everything that happens to the video and audio after the footage has been shot. This is "A. Post production" Now of the remaining 4 choices, "Final Cut Pro" sounds like an actual program. And there's only 1 option that's asking for a specific program. So we have 2. Most popular post-production editing package by Apple Answer "B. Final Cut Pro" This leaves us with 3 options "C. Non-linear editing", "E. AVID", and "F. Timeline" Of these 3, only "F. Timeline" sounds list an element in the interface of a video editing package. So we have 4. An element in the interface of editing software Answer "F. Timeline" Now a quick google search reveals that "AVID" is a software company that makes video editing software. So 1. Company that makes high-end post-production software. Answer "E. AVID" And we're left with 5. Transferring film onto Beta, digitizing it to the computer, and editing it Answer "C. Non-linear editing" Now the only questionable choice is Non-linear editing (NLE) for #5. So doing a quick google search and I see that #5 over specified the task. The key characteristic of NLE is having the video and audio in digital form that can be readily accessed via a computer. And #5 does qualify for that task. So here's the final answers 1. E 2. B 3. D 4. F 5. C 6. A</span>
6 0
3 years ago
In two-dimensional arrays, the _____________ is always listed second.
Sav [38]

Answer:

row

Explanation:

3 0
2 years ago
Other questions:
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • 1.
    6·1 answer
  • Is sonic better than piranha plant
    7·2 answers
  • ____ are the computers that store network software and shared or private user files.
    6·1 answer
  • what are Include the data on usage you gather from your interactions with friends or by listening to people on the radio or on T
    7·1 answer
  • adding ______around calculations indicates which calculations should be performed first before following the typical order of op
    6·1 answer
  • Which programming language uses objects?<br> a. C++<br> b. ALGOL<br> c. Pascal<br> d. BASIC
    6·1 answer
  • Explain at least 5 parts a a computer.
    11·1 answer
  • What steps should you take if your harassed online​
    9·2 answers
  • Who knows songs that are sad,happy,excited, and calm
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!