1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
4 years ago
15

A specific remote device with a fixed IP address must be able to access your computer across the network. It must be able to acc

ess the computer using any protocol. Which of the following exceptions in Windows Firewall should you make?
Service

Application

Protocol

IP
Computers and Technology
2 answers:
Softa [21]4 years ago
6 0

IP address as it clearly isn't an application and nor is it a protocol.

sweet [91]4 years ago
4 0

Answer: IP Address.

The IP Address of certain devices can be included as an exception by configuring the Windows Firewall. The user will have to create a custom rule in the inbound rules of the computer. The user will then have to add the IP address of the remote device as an exception to access the computer. Users can also configure their Windows Firewall by accessing the Control Panel > Windows Firewall > Advanced Settings.

You might be interested in
Quantas calorias os adolescentes devem consumir diariamente?
Tema [17]

Answer: los niños requieren un promedio de 2.800 calorías por día, las niñas requieren un promedio de 2.200 calorías por día.

Explanation:

6 0
3 years ago
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as netw
soldier1979 [14.2K]
Most network behavior analysis system sensors can be deployed in passive mode only, using the same connection methods as network based idpss. Idps works as a network or host based systems. Most Nba sensors can be deployed in passive mode only too. The Nba examines the network traffic.
7 0
3 years ago
Spam and i report
defon

Answer:

option d is the correct answer

8 0
3 years ago
Read 2 more answers
What is a perfect hashing function?
antiseptic1488 [7]

Answer:

First we understand what is hash function.A hash function is mostly used in Hashmaps. It maps different keys to a set of values.There may occur a case when we have same key but different values.This case is called collision.So we have to use different collision handling techniques that are open addressing and separate chaining.

A perfect hash function maps key-value pair such that there are no collisions.

3 0
3 years ago
after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?
gladu [14]
Keep the first hard drive then override it insert the second one and memory goes into the second one
8 0
3 years ago
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • Which occupation requires certification by the state?
    15·2 answers
  • Why does the job market change overtime
    9·1 answer
  • to add data to to a chart, you must format data from another microsoft office product, that automatically opens. whats the name
    10·1 answer
  • What is the advantage of maintaining a list of keywords while creating a design blueprint?
    13·2 answers
  • A personal computer (pc) or ____ is a small computer system designed to be used by one person at a time.
    12·1 answer
  • . Write programming code in C++ for school-based grading system
    8·1 answer
  • How do you think electronic spreadsheets have transformed businesses today?​
    6·1 answer
  • You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
    13·1 answer
  • suppose a malloc implementation returns 8-byte aligned addresses and uses an explicit free list where the next and previous poin
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!