1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
15

A software-based _________ is dedicated to examining and blocking internet traffic.

Computers and Technology
2 answers:
Anika [276]3 years ago
8 0

A software-based firewall is dedicated to examining and blocking internet traffic.

<u>Explanation</u>:

If we are seeking the answer we find that in computer world, a firewall is a network security system which is available for monitoring and controlling of entire incoming and outgoing network traffic, depended on predefined security rules.  

In addition a firewall typically forms a barrier or wall between a trusted or known internal network and untrusted or unknown external network like the Internet.

We also get that a firewall is often divided into two category which are network firewall and host-based firewall.

igomit [66]3 years ago
7 0

A software-based <u>Firewall</u> is dedicated to examining and blocking internet traffic.

You might be interested in
Advantages of special purpose computer
anzhelika [568]

Answer:

The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..

Explanation:

5 0
3 years ago
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
There are various risks from attacks on wi-fi networks. These include all of the following except _____.
Mariulka [41]

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

5 0
1 year ago
What are some benefits of 3-D printing?
Helga [31]

Faster Production.

Easily Accessible.

Better Quality.

Tangible Design and Product Testing.

Cost-effectiveness.

Creative Designs and Customization Freedom.

6 0
3 years ago
I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
gogolik [260]

I'm better then u in brawhlla

5 0
3 years ago
Other questions:
  • True/False
    11·1 answer
  • How can we lock pubg game from Play Store???​
    12·2 answers
  • In short and brave what is technology?
    9·2 answers
  • A ________ determines what cpus a system can use, what integrated ports the system can provide without use of third-party produc
    5·1 answer
  • CAN YOU PLEASE ANSWER THE QUESTION DOWN BELOW PLEASE? it not a question it a game
    8·2 answers
  • What do you use to put information into a computer?
    9·2 answers
  • What type of pointing device is often used by artists, and why is it ideal for artists?​
    12·1 answer
  • Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary c
    15·1 answer
  • Which of the following is NOT a media file? *<br> .wav<br> .mp4<br> .exe
    10·1 answer
  • given the variables temperature and humidity, write an expression that evaluates to true if and only if the temperature is great
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!