1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
4 years ago
14

A firewall filters traffic.true or false

Computers and Technology
1 answer:
valentinak56 [21]4 years ago
4 0
Its TRUE firewalls filters traffic
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.Firewall typically establishes a barrier between a trusted internal network and untrusted external network such as the internet.
You might be interested in
Derek is creating an animation for his class project. What is the first step Derek should follow while creating the animation?
quester [9]

Answer:

D

Explanation:

6 0
3 years ago
Read 2 more answers
Describe any four rights of users of information systems.
riadik2000 [5.3K]

Four Rights of users of information system are the following;

<span>·         </span>Protection from viruses, worms and other threats

<span>·         </span>User should have an effective training

<span>·         </span>The user should have a reliable system development as well as maintenance

<span>·         </span>The user should have a computing environment

8 0
4 years ago
Which setting on a profile makes a tab NOT accessible in the All App Launcher or visible in any app, but still allows a user to
Levart [38]

Answer:

freezer

Explanation:

you can freeze your application and it won't show on your launcher till you unfreeze it

5 0
3 years ago
WILL GIVE BRAINLIEST! An ________________ is a list of steps needed to answer a problem or finish a task. When the code is execu
Fudgin [204]

Answer:

Event

Explanation:

8 0
3 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Other questions:
  • Briefly discuss constraints
    13·1 answer
  • What is out put.what is data. what is microprocessor
    14·1 answer
  • Unlocking your smart phone remote security protections that protect your mobile device from meniscus applications
    5·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • Java Eclipse homework. I need help coding this
    6·1 answer
  • What is the widest area network?
    15·1 answer
  • An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
    12·1 answer
  • I am trying to do a python code quiz for school, the basic requirements for the quiz are: the quiz MUST have 10 questions
    15·2 answers
  • What is it called when a programmer includes a step in an algorithm that lets
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!