1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
7

When creating a firewall exception, what is the difference between opening a port and allowing an application through?

Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
6 0
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
You might be interested in
Which of these is a requirement for developing game applications on devices running Apple’s iOS operating system?
andrey2020 [161]

Answer:

A. Xcode libraries

Explanation:

We have to find a requirement for developing game applications on devices running Apple’s iOS operating system. For that, I will evaluate each answer.

A. Xcode libraries

Xcode can be generally defined as a development kit or integrated development environment to facilitate the Apple software development. Apple use iOS operating system for its devices. To develop anything compatible with iOS, you generally have to code it using Xcode. Obviously, each development kit includes libraries for project to be built. Therefore, this option is correct.  

B. Android Development Kit

Just like Xcode, Android Development Kit is used to build the software for android. It is pretty much comprehensible from its name. So,  this option is false.  

C. ARM technology  and D. advanced microprocessors

These both options are related to hardware and available on both the devices. It is used for overall processing but these options are not that relevant to iOS operating system. Therefore, these options are false too.

So, Correct option is Xcode libraries.

5 0
3 years ago
Read 2 more answers
Type of file containing instructions that tell your computer how to perform ___
julsineya [31]

Answer:

A)File

B)Native

C)Extension

D)File size

Explanation:

6 0
3 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
1 year ago
Other questions:
  • if the president goes for vice president after his 2 term and the present president dies is the old president the president agai
    8·2 answers
  • To easily add an organizational chart to a document, users should select _____. SmartArt Text Boxes Shapes Clip Art
    8·2 answers
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • You can get context-sensitive help information from the Code Editor by_________.A) selecting Contents from the Help menu
    9·1 answer
  • Can you awnser this question
    15·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·2 answers
  • There are many commercially made household linens found in the?
    7·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!