1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
10

1 point __________ is a combination of hardware and software that forms a barrier between systems, or different parts of a singl

e system to protect those systems from unauthorized access.
Computers and Technology
1 answer:
tigry1 [53]3 years ago
6 0

Answer:

firewall

Explanation:

Firewall that will protect the system from unauthorized access. While we are working on any network the security is essential part for us, so the use of firewall could protect and keep us secure.

Firewalls are available either in software or hardware and it is also available in the combination of both. System protection from unauthorized access and usage of data without permission could damage the integrity of data and system as well.

There are three types of firewalls.

  1. Packet Filters
  2. Stateful Inspection
  3. Proxy Server
  4. The external firewall is usually located at the extreme corner of the network the network is either local or wide area.

Firewall is been used by lot of companies those are providing the facility of clouds or data safety. Such companies use the firewall which will protect the data , no one from outside would access the data and the data remain safe. so in this context the company can maintain the integrity and customer trust as well. The companies can retain their customers easily by just using the hardware or software firewall or the combination of both which will not let any unauthorized user to access the data. The firewall will simply throw the unauthorized person or they would block the unauthorized person as well.

You might be interested in
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
By default, headers and footers apply to
AleksAgata [21]
Hold up I know he answer
6 0
3 years ago
How does a computer interact with its environment?
Zielflug [23.3K]

Answer:

Explanation:

A computer system can interact with its environment using hardware that does so such as cameras, robotic arms, thermometers, smart devices etc. These hardware devices gather information from the environment and transfer it to the computer system in a format known as bits through binary electrical impulses.

6 0
4 years ago
Read 2 more answers
Which expense is a bank least likely to extend a line of credit for?
m_a_m_a [10]

The answer would be:

A flat-screen TV.

7 0
4 years ago
Read 2 more answers
You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number list
Mademuasel [1]

Answer:

Option A; MINING THE SOCIAL MEDIA INPUTS.

Explanation:

Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.

Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research.

The number listed from phone call would result in long distance charges to your phone bill, therefore, the issue of MINING THE SOCIAL MEDIA INPUTS should be addressed by the company to keep its CRM in line with your expectations.

3 0
3 years ago
Other questions:
  • As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
    6·1 answer
  • Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
    7·1 answer
  • Your health insurance company gives you a discount if you wear a fitness-tracking bracelet. After wearing it for a few months, y
    5·1 answer
  • ____ is a programming language used to view and manipulate data that is stored in a database.
    6·1 answer
  • Output from the print statement is usually written to the ______ in the form of ________
    6·1 answer
  • 7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
    5·1 answer
  • Professional communication must be objective,
    8·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
  • A student has completed some work at school and wishes to take it home. He could use a pen
    9·1 answer
  • What is office course<br> how to learn office course
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!