1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
10

An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m

alicious attacks from the network layer up through the application layer. Which of the following fulfills this requirement?
A.Blacklisting
B.Encryption
C.Lockout
D.Whitelisting
Computers and Technology
1 answer:
klio [65]3 years ago
4 0

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

You might be interested in
3 Points
tino4ka555 [31]

Answer:

its B the person in the comments were right

Explanation:

took an edge test

6 0
3 years ago
Given a String variable response that has already been declared, write some code that repeatedly reads a value from standard inp
OverLord2011 [107]

Answer:

The following code is:

do     // set do while loop

{

response = stdin.next();    

}

while (response != "Y" || response != "y" || response != "N" || response != "n");

//  terminate do while loop

Explanation:

The following code starts with do while loop whose variables has already declared and then we assume the availability of the variable "stdin" which references the Scanner object and write some code to execute inside the do-while loop.

5 0
3 years ago
You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
-Dominant- [34]

Answer:

D. Electronic Funds Transfer (EFT)

Explanation:

e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.

In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).

3 0
2 years ago
Which layer defines an interface that applications can use to request network services, rather than referring directly to applic
Scrat [10]
Explain what is meant by a limited data set and how this HIPAA rule may affect medical assistants
4 0
3 years ago
Victoria is creating a brochure for her photography studio. She designed the layout and placed a photo in the center of the page
cestrela7 [59]

Assuming Victoria is using Adobe Photoshop to create her brochure, below are the steps she is required to follow.

She should first open the image on Photoshop, click on the image option and select duplicate just in case the resized image is not what she wants.

Still on the image option, she should select Image size. A screen will pop up at this point, indicating the image’s current size. For the purposes of image resizing, Victoria should select Pixel dimensions category.

She should be able to type her preferred dimensions for both the width and height. She should make sure ‘Constrain Proportions’ is unchecked to be able to type in separate values.

If she decides to use the photo editing program, she can simply click on the image, and if resize handles appear around it, she can click and drag those to the desired size.


3 0
3 years ago
Other questions:
  • Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
    13·1 answer
  • In the software development life cycle, what is the role of participants in the planning phase? The participants’ role in the pl
    6·1 answer
  • When writing a personal narrative, what point of view would be best to use? (1 point) first person second person third person th
    10·2 answers
  • A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company n
    9·1 answer
  • When using a search engine, what is the name of a word or phrase somebody types to find something online?
    12·2 answers
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • Write a program whose inputs are three integers, and whose output is the smallest of the three values. Ex: If the input is: 7 15
    5·1 answer
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    13·1 answer
  • Python program oranges and apples 3.4.6 copy and paste would be nice
    7·1 answer
  • [If you were the queen of the world .... What would you change ?]
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!