1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
14

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall
Computers and Technology
1 answer:
morpeh [17]3 years ago
4 0

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
You might be interested in
This organization created web standards to be followed in the creation and contentof a web page​
kumpel [21]

Answer:

The World Wide Web Consortium (W3C) is an international community where member organizations, a full-time staff, invited experts and the public work together to develop Web Standards. Led by Web inventor and Director Tim Berners-Lee and CEO Jeffrey Jaffe, W3C's mission is to lead the Web to its full potential.

<em />

<em>Hope you got it</em>

4 0
2 years ago
1.
aliya0001 [1]
#1 is D #2 is B #3 is A #4 is D #5 is B
3 0
2 years ago
Read 2 more answers
How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
Ad libitum [116K]

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

4 0
2 years ago
What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 1 2 4 3
Wittaler [7]

Answer:

2

Explanation:

got right on edg.

8 0
2 years ago
Read 2 more answers
A typical pda includes a(n) _____.
Ratling [72]
A.External Monitor.Hope I helped.
5 0
3 years ago
Read 2 more answers
Other questions:
  • What command in windows re gives you the opportunity to manage partitions and volumes installed on the system?
    7·1 answer
  • Binary is best interpreted by a computer because?
    8·2 answers
  • If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?
    11·1 answer
  • What does a data bar in a cell represents​
    12·2 answers
  • To open the dialog box for modifying styles, which step must you first complete in the Navigation pane?
    11·2 answers
  • Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding
    5·1 answer
  • Create an array named itemDescription containing the following item descriptions:
    15·1 answer
  • List three different sets of keywords that could be used to search for information on how to
    15·1 answer
  • What is the primary purpose of endnotes?
    6·2 answers
  • Can someone tell me what this means Higfaa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!