1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
11

You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen

t policy should you implement?
Computers and Technology
1 answer:
Natalija [7]3 years ago
5 0
If you want  to enable NAP so that all portal computers using wireless connections have an active firewall, then the type of enforcement policy that should be implemented would be the 802.1x enforcement. It can be used to be able to restrict network access when a certain computer is regarded as a noncompliant to requirements.
You might be interested in
Why is it important to cite your sources?
emmainna [20.7K]

Answer:

It gives credit to the original author and shows that you are not taking credit for someone

else's work

7 0
3 years ago
Read 2 more answers
. the web is based on the ________ protocol
elena55 [62]
The standard (and default) port for HTTP<span> servers to listen on is 80, though they can use any port. </span>HTTP<span> is based on the </span>TCP/IP protocols<span>, and is used commonly on the Internet for transmitting web-pages from servers to browsers.</span>
3 0
3 years ago
The ____ section of the project plan should describe the major project functions and activities and identify those individuals w
harkovskaia [24]

Answer:

Option(c) is the correct answer to the given question .

Explanation:

The Project responsibilities section is responsible of the planning of project.

Following are the Roles of the Project Responsibilities

  • To check the objective of the project goals.
  • Works with customers and  to define and meet client needs and the overall objective .
  • Cost estimation and expenditure production of the project
  • Ensure the fulfillment of the client .Analysis and enterprise risk management. and Tracking the progress of project.

All the others options are not responsible of the planning of project that's why Option(c) is the correct answer .

7 0
3 years ago
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
Tju [1.3M]

Answer:

The right answer is wire crimper tool.

Explanation:

According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.

RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.

A wire crimper effectively connects the end of the cable to an RJ45 connector.

4 0
3 years ago
Which statement is true?
Klio2033 [76]

Answer:

You need to import the deque methods in order to use a deque.

Explanation:

the correct option is B

You need to import the deque methods in order to use a deque.

Please mark me as brainliest

5 0
3 years ago
Read 2 more answers
Other questions:
  • Difference between implicit and explicit type casting
    7·2 answers
  • AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
    15·1 answer
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • The computerization of the layout and paste-up process further complicated printing, as did the digitizing of photographs.
    12·1 answer
  • Write a program that takes paragraph from the user and prints all unique words in that paragraph using strings in c++
    5·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a c
    11·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!