1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
2 years ago
13

If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic

e to a network by __________.
a. a Trojan horse
b. TCP/IP hijacking
c. Address Resolution Protocol (ARP) poisioning
d. DHCP man-in-the-middle
Computers and Technology
1 answer:
GalinKa [24]2 years ago
4 0

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

You might be interested in
A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
adoni [48]

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation: These are all most likely against school policy. In fact attempting to make a bomb is illegal.

5 0
3 years ago
Read 2 more answers
Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. Wh
amid [387]

Answer:

200 Ω

Explanation:

Hi there!

Please see below for the circuit diagram.

<u>1) Find the total resistance of the resistors in parallel</u>

Total resistance in parallel equation: \frac{1}{R_T} = \frac{1}{R_1} +\frac{1}{R_2}

Both the resistors measure 200 Ω. Plug these into the equation as R₁ and R₂:

\frac{1}{R_T} = \frac{1}{200} +\frac{1}{200}\\\frac{1}{R_T} = \frac{1}{100}\\R_T=100

Therefore, the total resistance of the resistors in parallel is 100 Ω.

<u>2) Find the total resistance of the circuit</u>

Now, to find the total resistance of the circuit, we must add the 100 Ω we just solved for and the 100 Ω for the other resistor placed in series:

100 Ω + 100 Ω = 200 Ω

Therefore, the total resistance of the circuit is 200 Ω.

I hope this helps!

7 0
3 years ago
Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
vlabodo [156]

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int numbers[50];

   int evekount = 0, odkount = 0;

   for(int i = 0; i<50;i++){

       cin>>numbers[i];

       if(numbers[i]%2==0){            evekount++;        }

       else{            odkount++;        }

   }

   cout<<"Even Count: "<<evekount<<endl;

   cout<<"Odd Count: "<<odkount<<endl;

   return 0;

}

Explanation:

This declares the integer array of number

   int numbers[50];

This initializes the even count and odd count to 0

   int evekount = 0, odkount = 0;

This iterates from 1 to 50

   for(int i = 0; i<50;i++){

This gets input for the array

       cin>>numbers[i];

This checks for even

<em>        if(numbers[i]%2==0){            evekount++;        }</em>

This checks for odd

<em>        else{            odkount++;        }</em>

   }

This prints the even count

   cout<<"Even Count: "<<evekount<<endl;

This prints the odd count

   cout<<"Odd Count: "<<odkount<<endl;

3 0
2 years ago
A data use agreement is required when a researcher uses a limited data set (lds). an lds must have:_________
svetoff [14.1K]

An LDS must have all direct identifiers removed.

According to the HIPPA policy, a Limited Data Set (LDS) is a kind of data set in which direct identifiers are removed.

Limited Data Set  (LDS) is a set of data that can be used for research purposes under the HIPPA policy without any authorization from the patient. However, this kind of data ensures that any kind of identifier information such as the patient's name, relative's name, address, number etc is not shared and not made a part of the research.

Limited Data Set (LDS) shows common information like age, city, and gender information from the data.

The Limited Data Set (LDS) is available to only those researchers with whom the data use agreement has been signed.

To learn more about  Limited Data Set (LDS), click here:

brainly.com/question/2569524

#SPJ4

7 0
1 year ago
The following is a sequence of undo-log records written by two transactions T and U: &lt; START T&gt;; ; &lt; START U&gt;; ; ; ;
tatiyna

Answer:

Giving that: The following is a sequence of undo-log records written by 2 transactions T and U:

< START T >;

< T,A,10 >;

< START U >;

< U, B, 20 >;

< T, C, 30 >;

< U, D, 40 >;

< Commit U >;

< T, E, 50 >;

< Commit T >;

1. < START U >

      Recovery action in this case will be undo(-1) and undo(0). All restored to its original Value

     log records < T, A, 10 >,  < T, abort >; as written out

2. < T, E, 50 >

      Recovery action in this case will be undo(8) and redo(0). A and C is restored to its original value, B and D are set to 20 and 40

      log records <T, C, 30 >,  < T, A, 10 >,  < T, abort >  are written out

3. < Commit T >

      Recovery action in this case will be redo(7) and redo(4). A and C are set to 10 and 30, B and D are set to 20 and 40

7 0
3 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • WILL MARK BRAINLYIST
    15·2 answers
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • Oday's color display devices represent color using the ______ color model.â
    13·1 answer
  • If you enjoy working with livestock, the best cluster in which to research careers would be: A. Health Science. B. Agriculture,
    11·1 answer
  • the technique of blocking some parts of a photograph to emphasize (or draw attention to) another part of the same photograph is
    8·1 answer
  • Digital cameras always create great photographs. <br>True <br>False
    14·2 answers
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • Primary functions of lighting are sufficient light to...
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!