1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
10

Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False

Computers and Technology
1 answer:
Sauron [17]3 years ago
3 0

Answer:

A. True

Explanation:

Data encryption is a technique that converts clear text into unreadable text and transmitted over a network, to prevent attackers from understanding the information send to the receiver, which can only be deciphered by the receiver and the sender with special keys or software.

An intrusion prevention system is used to mitigate cyber attackers by preventing unwanted packets that could be malicious, from entering the network.

The intrusion prevention system can only see clear text data. For this reason, an encrypted text can pass through the prevention system untouched.

You might be interested in
My friend has a battery of 9000mah and loses 10 every day how many days well it take to go to zero
forsale [732]
I think it's 900 but I can't be sure.
8 0
3 years ago
________ are found on the motherboard and are used to attach your hard disk.
Naya [18.7K]
<span>SATAs are found on the motherboard and are used to attach your hard disk.
</span>The SATA standard is most often used today by hard drives to communicate with a system motherboard. SATA stands for <span>Serial AT Attachment.
</span>It is a computer bus<span> interface that connects </span>host bus adapters<span> to </span>mass storage devices<span> such as </span>hard disk drives<span>, </span>optical drives<span>, and </span>solid-state drives<span>.</span>

4 0
3 years ago
Blair is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an emp
gizmo_the_mogwai [7]

Answer:

data

Explanation:

Because i said so

4 0
3 years ago
Different computer applications and their uses.
sukhopar [10]

Answer:

Application Software Type Examples

Word processing software MS Word, WordPad and Notepad

Database software Oracle, MS Access etc

Spreadsheet software Apple Numbers, Microsoft Excel

Multimedia software Real Player, Media Player

Presentation Software Microsoft Power Point, Keynotes

Explanation:

5 0
3 years ago
Miriam is very detail oriented within the first month of her new job as a network support specialist she became very good at dia
love history [14]
What is the question?
3 0
3 years ago
Other questions:
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • Lures, reels, rods, hooks, baits and nets are common equipment used in what food gathering method?
    15·2 answers
  • You will be given a string, containing both uppercase and lowercase alphabets(numbers are not allowed).
    14·1 answer
  • True/False
    13·1 answer
  • How do u type faster
    5·1 answer
  • Help meee pleaseeee
    5·1 answer
  • Hi everyone,
    6·1 answer
  • Which term best describes these lines?
    7·1 answer
  • Define management styles
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!