1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
4 years ago
8

Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________

__ based intrusion detection/prevention system.
Computers and Technology
1 answer:
allsm [11]4 years ago
3 0
Host

---------------------------------------------------
You might be interested in
Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None
Rudik [331]

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

4 0
3 years ago
What do you mean by real time system? Why real time system needs to response within limited time?
Anna11 [10]

Real time system means that the system is subjected to real time, i.e., response should be guaranteed within a specified timing constraint or system should meet the specified deadline. For example: flight control system, real time monitors etc.

4 0
3 years ago
Which key do programmers use to end running programs?
Aleksandr [31]
<span>Pause/Break   i would say</span>
3 0
3 years ago
Read 2 more answers
Which of the following statements is true of a cookie? a. A cookie can create copies of itself and spread to other networks to e
Ilya [14]

Answer: D.

Data about user preferences and activity is captured and stored under a cookie on a company’s Web server.

Explanation: The most common and best-known technology for user tracking is the use of cookies. Other known online website tracking tools are tracking pixels (or pixel tags), web beacons (or ultrasound beacons), and browser fingerprinting (or digital fingerprinting), amongst others.

a cookie will contain a string of text that contains information about the browser. To work, a cookie does not need to know where you are from, it only needs to remember your browser. Some Web sites do use cookies to store more personal information about you.

8 0
3 years ago
Why are using some special characters (@, #, !, etc.) not a good idea?
konstantin123 [22]
There are pros and cons to using special characters in email subject lines. Generally, marketers report higher open rates.

Some report better engagement, but many don’t.

There are also reports of special characters causing problems with deliverability, mostly because spammers became very fond of special characters for a while.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A trojan horse
    12·1 answer
  • Hello, can you help me answer these questions?
    9·2 answers
  • "Once a business operations analysis is completed and change needs to
    7·2 answers
  • 6.   If you enter 234.567 into a cell that is formatted to display 1 decimal place, what is the value stored in the cell?
    15·2 answers
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Data is?
    15·1 answer
  • PLEASE HELP I mainly only need the answer for 4.
    5·1 answer
  • Make variables to represent the length and width of a rectangle, called length and width, respectively. You should set length to
    7·1 answer
  • When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!