1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
9

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve

this, which protocol should the administrator use?
Computers and Technology
2 answers:
Sedaia [141]3 years ago
5 0

DLP stands for Data Loss Prevention

The process of stealing data loss is prevented by “monitoring, detecting and blocking”. This avoids data leaks during “network traffic – in motion”, “in use – endpoint action” and “at rest – data storage”. The term “data loss and data leaks” are same and it can be used interchangeably.

There are various other technical terminologies associated with data leak are “ILDP – Information Leak Detection and Protection”, “ILP – Information Leak Protection”, “CMF – Content Monitoring and Filtering”, “IPC – Information and Protection Control”, “EPS – Extrusion prevent system”, etc.

Contact [7]3 years ago
5 0

Answer:

transfer one of network's

You might be interested in
i want to activate a shader on minecraft pe but when i click it an activate button doesn't show up and i've reloaded it multiple
trasher [3.6K]

Answer:

I tried it as well and the option is greyed out. It seems like some or all texture packs are not supported on bedrock mobile. This could be due to performance issues, or compatibility. I'm not fully familiar with bedrock mobile, but on bedrock desktop I had no issues.

7 0
3 years ago
When the computer makes room for sentences on the next line, this is called
OLga [1]
That's easy its called enter you can push enter and it will bring you to the next line so that's it good bye have a nice day
3 0
3 years ago
write a python program to find all words in a string which are at least 6 characters long and starts with a capital ‘a’ or small
lawyer [7]

Answer:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

Explanation:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

3 0
2 years ago
What feature in Excel automatically displays a list of field headings when you begin to create a structured reference?
DedPeter [7]

Answer:

Formula Auto-Complete

Explanation:

To minimize typing and syntax errors, you can create and edit formulas with Formula Auto-Complete.

After you type an<em> = (equal sign)</em> and begin typing to start a formula, Excel displays a dynamic drop-down list of valid functions, arguments, defined names, table names, special item specifiers—including [ (open bracket),, (comma), : (colon)—and text string that match the letters you type. An argument is the cell references or values in a formula that contribute to the result. Each function uses function-specific arguments, which may include numeric values, text values, cell references, ranges of cells, and so on

3 0
4 years ago
Within the hardware of the personal computer temporary memory is known as
ANEK [815]
The answer would be the Cache
7 0
3 years ago
Read 2 more answers
Other questions:
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • How does a pond form?
    7·1 answer
  • Which of the following keys open the spelling and Grammer dialog box
    6·1 answer
  • Which of these is a way of making applications less vulnerable to hacking?
    7·2 answers
  • Join my disc server "the angels"<br><br> https://dis cord.gg/PYnWArCz<br><br><br> tyyy
    5·1 answer
  • The identification of the technology management framework contain?
    6·1 answer
  • (Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
    11·2 answers
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • What tool allows you to search external competitive intelligence research?
    14·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!