1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
5

For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc

omplish this task?
Computers and Technology
1 answer:
liq [111]3 years ago
6 0
<span>The administrator of the network can access the admin settings on the network's primary DNS servers. From there, there are hundreds of various settings and changes to make. There is one, however, that is able to disable pings. This will prevent computers from responding to ping requests. This can help to ensure internal security and reduce internal network traffic.</span>
You might be interested in
Why did hockey champion Haley wickenheiser feel angry after the Bach said the IOC would make a decision in the next month?
aliina [53]

Haley wickenheiser felt angry after the Bach said the IOC would make a decision in the next month as the IOC says the games will be held no later than summer 2021 but they will still be called the 2020 Tokyo Olympics.

Explanation:

  • The Tokyo Olympics were postponed until 2021 on Tuesday, ending weeks of speculation that the games could not go ahead as scheduled because of the coronavirus pandemic.
  • The International Olympic Committee made the decision after speaking with Japanese Prime Minister Shinzo Abe and local organizers.
  • The IOC said the games will be held not later than summer 2021 but they will still be called the 2020 Tokyo Olympics.
  • “President Bach said he will agree ‘100%,’ and we agreed to hold the Tokyo Olympics and Paralympics in the summer of 2021 at the latest,” Abe said, saying holding the games next year would be “proof of a victory by human beings against the coronavirus infections.”
  • The decision came only a few hours after local organizers said the torch relay would start as planned on Thursday.
4 0
3 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
3 years ago
Read 2 more answers
What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon
Viktor [21]

Explanation:

hbbbbhygjjjjkllkkjhkkky

5 0
3 years ago
Read 2 more answers
Are the blank space around the edges of the page
Law Incorporation [45]

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

8 0
3 years ago
Consider the following code segment: try : inputFile = open("lyrics.txt", "r") line = inputFile.readline() print(line) _________
aleksandrvk [35]

Answer:

The answer is "except IOError:"

Explanation:

It is part of the exception handling, that stands for input/ output operation fails, this exception aeries when we attempting to access an anti-existent file, in the program so, it will give the program related errors.

  • This type of error is handled in the try block, it also allows you to prepare the deal with the exceptional block.  
  • It also helps you to hide the bugs by using code, if you handle an unexpected error.
6 0
3 years ago
Other questions:
  • Why is it important to begin development of a software solution with a programming design in place? A programming design summari
    11·2 answers
  • Can i have information about skrillex hobbies
    6·1 answer
  • To create a new folder, press ____.
    12·1 answer
  • List the steps in setting up an online banking account
    12·2 answers
  • Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?
    13·1 answer
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • Explain the characteristics of a first generation computer​
    8·1 answer
  • Describe some things that this person might say that might cause you to NOT hire them. Explain.
    6·1 answer
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!