1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
4 years ago
5

How does machine learning help to make modern Web Application Firewalls more effective? (Choose two.)

Computers and Technology
1 answer:
MissTica4 years ago
8 0

Answer:

Option(a) and option(d) are the correct answer for the given question.

Explanation:

In this question options are missing so the options of this question is given below.

a Behaviour analysis can be done at the machine speeds.

b Search results are returned by the quicker than using traditional method of  

filtering

c Adapted the ever-changing attributes of an threat.  

d choose the most appropriated web application for the given task.

Web Application Firewalls are the effective which helps in learning for the machines to make it modernized. So, that's why the analyzing of the behavior could be done at the speed of the machine and also select that appropriate web applications for the following tasks. That's why the following options are true for the given question.

You might be interested in
Many web pages today use ____ —small text files that are stored on your hard drive by a web server, typically the one associated
elena-14-01-66 [18.8K]
The data of the webpages on the Internet are commonly stored into hard drives from servers around the world. These supercomputers have the capability to store huge chunks of data just to keep the web page from running. The HTTP protocol is the one that allows for these servers to store data.
3 0
3 years ago
Read 2 more answers
pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users
jeka57 [31]
Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine
7 0
3 years ago
All of the following are advantages of database-stored information, except: Question 3 options: 1) Reduced information redundanc
enot [183]

Answer:

3) Reduced information integrity.

Explanation:

This is not an advantage, Information integrity is a key factor when storing information on a database. As multiple users will access it, they will need this data to be authentic and dependable. Any reduction in information integrity is a great disadvantage.

5 0
3 years ago
g write a recursive function that prints out all the even numbers between x and y inclusive if x is odd then the print out will
Reil [10]

Answer:

The function written in python is as follows:

def EvenNumbers(x, y):

    if (y < x):

         return

    if (y % 2 == 0):

         EvenNumbers(x, y - 2)

    else:

         EvenNumbers(x, y - 1)

    if (y % 2 == 0):

         print(y)

Explanation:

x represents the lower limit while y represents the upper limit.

So, the recursion will be repeated as long as x <= y

This defines the function

def EvenNumbers(x, y):

This checks if y < x. If yes, the recursion stops execution and return to the main

<em>     if (y < x): </em>

<em>          return </em>

The following if and else condition checks determines the appropriate range of the recursion.

<em>     if (y % 2 == 0): </em>

<em>          EvenNumbers(x, y - 2) </em>

<em>     else: </em>

<em>          EvenNumbers(x, y - 1) </em>

The above takes care of printing starting at x + 1 if x is odd

This checks and prints the even numbers in the range

<em>     if (y % 2 == 0): </em>

<em>          print(y)</em>

<em />

To call the function from main, make use of

EvenNumbers(x, y)

Where x and y are integers

e.g EvenNumbers(2,10), EvenNumbers(1,17), EvenNumbers(3,21)

<em>See attachment</em>

3 0
3 years ago
Which of the following terms BEST describes the act of animating an object?
Whitepunk [10]
Bump mapping is right answer
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which spereadsheet type will determine<br> how well a bussiness has done over the past year
    11·1 answer
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • Consider the following code snippet.a.File inputFile = new File("dataIn.txt");b.Scanner in = new Scanner(inputFile);c.while (in.
    7·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • What is a PowerPoint template?
    6·2 answers
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    6·1 answer
  • I'm trying the game WWE 2k20 for my computers and technology and a extra credit question is how do you pull down the singlet str
    12·1 answer
  • It is a field that contains a unique identifier for each record in a primary table
    5·1 answer
  • 15. The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cel
    13·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!