1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
2 years ago
11

You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen

t policy should you implement?
Computers and Technology
1 answer:
Natalija [7]2 years ago
5 0
If you want  to enable NAP so that all portal computers using wireless connections have an active firewall, then the type of enforcement policy that should be implemented would be the 802.1x enforcement. It can be used to be able to restrict network access when a certain computer is regarded as a noncompliant to requirements.
You might be interested in
Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
9966 [12]

Answer:

125 percent of continuous load

Explanation:

8 0
2 years ago
If you get musicilly can your parents see
Tresset [83]
I wouldn't think so unless they have access to your phone or account. But I don't believe this is school related.
6 0
3 years ago
Read 2 more answers
What is heaven backwards?
sweet-ann [11.9K]
It is Nevaeh backwards hope that helps! :3 and feel free to pm me if you have anymore questions! :3
5 0
2 years ago
Read 2 more answers
Microsoft word is an example of utility software? <br><br>A.true <br>B.false​
monitta

Answer:

false

Explanation:

Ms word is only an application software

7 0
2 years ago
Read 2 more answers
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
jonny [76]

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

3 0
2 years ago
Other questions:
  • What is the unique impact him professionals have on coded data?
    11·1 answer
  • Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of
    7·1 answer
  • When Amy turns on her computer, she notices a burning smell. Smoke comes out of the case, and Amy immediately turns off her comp
    7·1 answer
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • What is a main cause of an aurora?
    8·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • Android OS "AFTER" Alpha.<br><br> A. Bubblegum<br><br> B. Beta<br><br> C. Berry<br><br> D. Buzz Cola
    10·1 answer
  • MULTIPLE COICE! BRAINLIEST
    12·1 answer
  • can you guys plz answeer this i need help rrly bad and plz no viruses or links or answers that have nun to do with this
    5·1 answer
  • What ribbon command on the home tab can you use to change a cell fill color automatically
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!