1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
4 years ago
14

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall
Computers and Technology
1 answer:
morpeh [17]4 years ago
4 0

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
You might be interested in
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the s
GrogVix [38]
Console Port Method

Connecting a computer to a Cisco device through the console port requires a special console cable.
8 0
3 years ago
Reusable modules, which are represented in the structure chart as rectangles with vertical lines on both sides, may often appear
Molodets [167]

Answer:

The answer to this question is the option "A".

Explanation:

In this question, the answer is option "A" which is the library. The term library stands in programming language for library made available across implementations of a programming language. In the programming section library is a collection of pre-compiled modules that a program can use and modules are stored in object format. We can reuse these modules in our program. So the answer to this question is the library.

8 0
3 years ago
What is curated content?
disa [49]

Answer:

Content from the web that has been sorted through and shared on a brand’s digital platforms.

Explanation:

This type of content is created by other organizations but shared by a brand because they believe it will be of interest to their audience.

RIP 999

6 0
3 years ago
A poem for coduction
Nataly_w [17]
I don't know if you want a poem about conduction but if so here ya go

no matter how the heat
different temperatures meet
hot to cold how it's done
4 0
4 years ago
Read 2 more answers
Which of the following statements is NOT correct?
Ainat [17]

Answer: B)  Pseudocode should be properly formatted.

Explanation:

 Pseudocode is defined as in the informal description of the given sequence, there is no need that it should be formatted properly. There is no such restriction required in the pseudocode as they are read by the humans not by the computer programs.

Pseudocode should be terminating, executable and unambiguous and it uses structural convention of the programming language rather than using machine reading.

4 0
3 years ago
Other questions:
  • Clearing the computer's cache helps store recently-used information.<br><br> True<br> False
    10·2 answers
  • The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat
    7·1 answer
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • For this assignment: Analyze and describe the network infrastructure. Describe and explain the various policies that will be nee
    11·1 answer
  • Which type of interview is conducted in a format where the interviewee is questioned and presented to a panel of individuals?
    7·2 answers
  • Each device attached to your computer comes with a special program called a(n ________ that enables the device and operating sys
    15·1 answer
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • In Full Screen Reading View, which area is reduced?
    14·1 answer
  • Starting in 2024 under a new law, all new smartphones sold in the eu must have….
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!