1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
8

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I

PS systems are the network's specialized security devices. Group of answer choices
Computers and Technology
1 answer:
AysviL [449]3 years ago
3 0

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

You might be interested in
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
What is graphical symbols​
evablogger [386]

Explanation:

A graphical symbol is a visually perceptible figure with a particular meaning used to transmit information independently of language.

if this helps you please mark me brainliest

have a nice day :)

6 0
3 years ago
Which of the following is NOT a cost typically associated with owning a car?
Arturiano [62]
A. fuel ; when you but a car you aren't buying the gas to go in it 
3 0
4 years ago
If you were to go back in time, what games might you find kids playing at the local arcade? List and describe at least two games
Mrac [35]

Answer:

Pac-Man Battle Royale, Space Invaders Frenzy

Explanation: Pac-man Battle Royal, came out in 2011 not that long ago. Space Invaders Frenzy came out in 1978. That came out A WAY long time ago.

6 0
4 years ago
What type of file system is used by blu-ray discs?
soldi70 [24.7K]

Answer:

Universal disc format (UDF) file system.

Explanation:

Blue-ray discs are the optical disc for data storage in a digital format. They were designed as succession of DVDs. They use UDF file system in them.

  • UDF file system is used in blu-ray discs.
  • This system is used to store data on discs by burning media.
  • These files have the extension (.UDF)
  • UDF is mostly used in DVDs and optical discs.
  • Broad range of data is stored in computer storage using UDF.
8 0
3 years ago
Other questions:
  • You can access your programs, your documents, your printer, even help from
    15·2 answers
  • If a linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
    7·1 answer
  • Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
    6·1 answer
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • Which of the following is the last step in creating a budget?
    13·1 answer
  • Rebecca is an interior designer. What is her job role? need this asap
    9·1 answer
  • What is a computer memory <br>​
    9·2 answers
  • The Klez virus was a worm created to "spoof others. What is "spoofing"?
    6·1 answer
  • What changes might you make to a circuit in order to slow the flow of electrical energy?
    13·1 answer
  • (blank) is an expansion card that enables a computer to connect to a network:
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!