1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
5

For which firewall feature should you create forward trust and forward untrust certificates?

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
8 0

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

You might be interested in
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
ArbitrLikvidat [17]

When you are working on a project to make or better a system to help people at your college or workplace to find jobs, then the system should be made for the student and work for the population and should be simple so people can work their way around it. You can use these following techniques.

  • Interviewing is a good way to have face to face and more interactive ways to communicate with your colleagues and clients. Unlike the next one which is a survey, this can be more personal and you'll get better answers than a computer program could.
  • Surveys are a great way to collect data and get people's opinions! It is also faster and more efficient if you're on a tight schedule.
  • A document analysis are the last ones to mention here. You can see how an already existing system is working and make a study based on that.

Five requirements in a traceability matrix that I would use are the following:

  1. Plan meetings with stakeholders who may want to work with your system development because they'll be the first ones that are upfront and into the project.
  2. Make more meetings and surveys to help people who are using your system do its purpose of finding people jobs at the workplace and college.
  3. Study your system to make sure it works and then do an analysis
  4. Make sure you do effective system documentation preparation and make sure to also have nice and helpful guides and other things that can help you and your system development.
  5. Have a team of Business Analysis visits stakeholders who will show them the ropes of the business requirements and how the system is being made and what design is going to be put out of the system.

Hope this helps. HAVE A BLESSED AND WONDERFUL DAY! As well as a great rest of Black History Month! :-)  

- Cutiepatutie ☺❀❤

6 0
4 years ago
a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
charle [14.2K]

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

6 0
3 years ago
Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T
iren [92.7K]

Answer:

Explanation:

( n cards are there initially )

we pick out the first card in random it takes n-1 comparisons to figure out

its Equivalence card - n-1 steps

Two cards have been eliminated ( this leaves us with 2 and n-2 cards)

we pick out the 2nd card in random it takes n-3 comparisons to figure out

its Equivalence card - n-3 steps

we continue to do this.. till all cards are exhausted ( leaves us with 2

and n-4 cards again)

the last comparison will

have

- n-(n-3)

the sum of all these steps - (n-1) + (n-3) + (n-5) + .........+

(n-(n-3))

if you draw this in the form of a tree.

n - n

2

n-2 - n

2

n-4 - n-2

2

n-6 - n-4

2

n-8 - n- 6

the height of the tree will be log n , sum @ each level is at most n

8 0
3 years ago
Your program is going to compare the scores of two volleyball teams that play each other. To win a match in volleyball, a team m
Alenkasestr [34]

Answer:

#section 1

team1=0

team2=0

matches=[1,2,3,4,5]

for i in matches:

   print("For Game ", i)

#section 2

   while True:

       try:

           scoreA = int(input("Enter score for first team: "))

           scoreB = int(input("Enter score for second team: "))

       

           if scoreA < 25 and scoreB < 25:

               raise ValueError

           try:

               if abs(scoreA - scoreB) < 2:

                   raise  

               else:

                   break

           except:

               print("difference less than 2")

   

       except ValueError:

           print("Enter correct scores")

#section 3

       print("For Game ", i)

   if scoreA > scoreB:

       team1 = team1 + 1

   else:

       team2 = team2 + 1

#section 4

if team2 > team1:

   print("Team 2 is the winner")

else:

   print("Team 1 is the winner")

Explanation:

There is no way you can run the code without using a break statement because, in a while loop you have to pass an argument that will exit the loop. if you don't your loop will keep running and that's not good.

You might have also gone about it in a way that is a bit complicated. when writing code always look out for ways to make your work easier.

I used a For Loop, While Loop and an array.

#section 1

team1=0  

team2=0  

matches=[1,2,3,4,5]  

for i in matches:  

print("For Game ", i)  

- In this section two variables were declared two variables to hold the final results after both teams have played their 5 games and their scores recorded

- An Array holding the number of games they're to play was also declared. they are playing 5 so the Array "matches" holds 5 elements.

- The first loop here is the "For loop" and what it does is to run the block of code under it for all the elements in the Array.

- finally we print for game "i" where i is each game in the array

#section 2

 while True:

       try:

           scoreA = int(input("Enter score for first team: "))

           scoreB = int(input("Enter score for second team: "))

       

           if scoreA < 25 and scoreB < 25:

               raise ValueError

           try:

               if abs(scoreA - scoreB) < 2:

                   raise  

               else:

                   break

           except:

               print("difference less than 2")

   

       except ValueError:

           print("Enter correct scores")

- A while loop is always true unless it encounters an argument that is not true or a break statement is inserted.

- This section is responsible for taking all the inputs required and if a wrong input is entered it would show the specific error and ask you to make the input again.

- Here the Try and Except is use to handle the errors. When the Try block encounters an error it goes to the Except block and executes whatever it finds there.

- The first try block prompts and takes inputs, it then checks if the values inputted satisfies or violates the 25-point rule.

If it does not satisfy the 25-point rule, it goes to it's error block and prints "enter correct score" and the WHILE loop runs again.

within this Try block is nested another try block. if the first try block does not raise any error it proceeds to the second try block.

- The second Try block checks the difference between the scores and if it is less than 2, it raises an error and prints difference is less than 2 and runs the WHILE loop again.

- If there are no errors it BREAKS out of the WHILE loop then the FOR loop moves to the next match.

#section 3

       print("For Game ", i)

   if scoreA > scoreB:

       team1 = team1 + 1

   else:

       team2 = team2 + 1

- Remember there is still a for loop. This section prints the game we just recorded, and checks which team won. It then adds the win as a point(1) to the teams total score.

#section 4

if team2 > team1:

   print("Team 2 is the winner")

else:

   print("Team 1 is the winner")

- In this section the For Loop has finished running and the final values are ready, it compares the scores of both teams and declares the winner.

I have placed an attachment to help you see the code in action.

5 0
3 years ago
Features of action files​
nadezda [96]

Answer and explanation:

An ".action" file is a file written in Xcode and used by the <u>Automator</u> program, whose function is to create automations in macOS.  Action files contains specific actions that can be combined with other actions to create an automated process.

This type of file is used to automate tasks in <u>macOS</u>, usually with Finder (file manager) or another program.  

Action files are especially useful for repetitive tasks, such as creating sequential batch folders, editing images, or deleting files.

6 0
3 years ago
Other questions:
  • What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app
    9·1 answer
  • Computer a has an overall cpi of 1.3 and can be run at a clock rate of 600mhz. computer b has a cpi of 2.5 and can be run at a c
    11·1 answer
  • Because a vector container uses a dynamically allocated array to hold its elements,
    5·1 answer
  • Which of the following is not a data type in python Float, string, integer, decimal ​
    15·2 answers
  • Can someone pls help me my notifications aren’t working, I need help ASAP ty!
    5·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • If you have a database of books in the library and you would like to find all books published after January 1, 2008, what criter
    7·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • HTML code to display square bullets in an unordered list​
    7·1 answer
  • True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!