1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
11

In theory, the use of a software firewall as a replacement for a network appliance can work as long as the host OS's network com

munication is routed through which type of firewall?
Computers and Technology
1 answer:
loris [4]3 years ago
5 0

Answer: Virtual firewall

Explanation: Virtual firewall is the firewall system that is implemented on the virtual environment . These maintain the protection of the  network by the filtration of the network traffic.

This firewall is used as the replacement for the network because they have easy cloud to cloud movement.They also maintain the security by disapproving of the risky communications. It is also easy tom maintain and update.

You might be interested in
Which one of the secondary storage types below would be best if you wanted to edit files and re-save them to secondary storage?
jenyasd209 [6]
USB drive
the cloud
google docs
google drive
7 0
3 years ago
Which keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the
I am Lyosha [343]

The keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the document  is  Ctrl+G or F5.

<h3>What is a keyboard shortcut?</h3>

Keyboard shortcuts are known to be keys or a set of combination of keys that a person can press on one's keyboard to carry out a specified tasks.

By using keyboard shortcuts , one is often often faster than using a mouse  and  to see the option you are looking for, you have to press Ctrl+G or F5.

Learn more about keyboard shortcut  from

brainly.com/question/12531147

8 0
2 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
If A = 5 i + j abd B = 2k then A - B in equal to​
Leto [7]

the answer is A-B=5i+j-2k

8 0
3 years ago
Which activity should be part of a long-term plan to positively affect your
STatiana [176]
D that is the answer but I need 20 words to send this text
5 0
3 years ago
Other questions:
  • When the wires are connected to the terminals of the battery, what causes electric current in the circuit?
    15·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • What is the full form of RAM. ​
    5·2 answers
  • A medium format camera has a large image sensor what benefit will a large sensor have for resulting images. PICK MORE THAN ONE.
    7·1 answer
  • What is the empty space inside the character 'O' called?
    12·1 answer
  • Which of the following components converts AC to DC?
    5·1 answer
  • Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
    8·1 answer
  • Write about how this item was important to you.
    9·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!