1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
4 years ago
15

A nidps sensor that sits off to the side of a network segment, monitoring traffic without mandating that the traffic physically

pass through the sensor, is known as a(n) ____.principles of incident response and disaster recovery
Computers and Technology
1 answer:
dolphi86 [110]4 years ago
7 0
Is known as passive sensor

An NIDPS looks for indications of successful attacks while residing on a PC connected to that network. The NIPDS can be installed to monitor all traffic between systems on a network. 

A passive sensor examines copies of traffic on an entire network with no actual network passing through the sensor. Passive sensor is unlike inline sensor. Traffic on Inline sensor must pass through the sensor.






You might be interested in
Which statement is correct? a. choice of metric will influence the shape of the clusters b. choice of initial centroids will inf
katrin2010 [14]

Answer: the answer is c

Explanation:in general, the merges and splits in hierarchical clustering are determined in a greedy manner

8 0
3 years ago
As you apply to college when should you apply for financial aid
Nataliya [291]

Answer:

after you are accepted in the college

Explanation:

You should apply for admission to the colleges you are interested in BEFORE filing your FAFSA. Once you are accepted to the colleges you have applied to, you can add those schools to receive financial aid award offers from when you file your FAFSA.

4 0
4 years ago
The coordinates for the section element need not be defined as long as its position is set to
scoray [572]
<h2><u>Answer:</u></h2>

relative.

<h2><u>Explanation:</u></h2>

The coordinates for the section element need not be defined as long as its position is set to relative.

If the position is set as relative, then it will have no effect on the positioning attributes, it will consider as static position. If positioning is mentioned explicitly like top: 20px; then it will position 10 pixels down from where it is located. An ability for positional shifts is extremely helpful.

Two things happen when an element is set as relative, one is it introduces the ability to use z-index on that element, second is it limits the scope of absolutely positioned child elements.  

5 0
2 years ago
Write an algorithm to sum to values
Elis [28]

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

5 0
3 years ago
The file command provides information about any file system object (i.e., file, directory or link) that is provided to it as an
NeTakaya

Answer:

The answer is "Option a, c, and d".

Explanation:

This command aims to define the argumentation from each entity of the file system like a disc, path, or link. It checks the usage of a measurement system, which is requested to collect the information from either the inode of the item, the description of the option as follows:

  • In option a, It is used to identify the file type.
  • In option c, This command is used to list all file types.
  • In option d, This command is used to list all the current directories.
  • In option b, It is used to describe a single entity directory.
7 0
4 years ago
Other questions:
  • You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196
    6·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • Can you answer my question it's a bit confusing to me! I'm adding brainlist too!
    8·1 answer
  • RAID level ________ refers to disk arrays with striping at the level of blocks, but without any redundancy. A. 0 B. 1 C. 2 D. 3
    7·1 answer
  • Which is a correctly formatted Python tuple?
    9·1 answer
  • Describe an application or a situation in which it is not convenient to use a linked list to store the data of the application
    12·1 answer
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    10·1 answer
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
    13·2 answers
  • Using a conversation voice is part of:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!