1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
10

Baseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, th

ey are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack
Computers and Technology
1 answer:
Blizzard [7]3 years ago
5 0

Answer:

The intrusion system

Explanation:

To begin with, intrusion system is a system that monitors the network system for malicious activities or contents.

Baseline LAN standards concerns are not unusual, particularly with organizations in such line of business. It is also believed that in spite of the effectiveness of routers and good firewalls, they are not 100% effective. It's thus in the light if the foregoing that intrusion system come on board, and present a super effective wide range of protection for use by the Baseline Standards.

You might be interested in
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and d
vladimir1956 [14]

Answer:

A. Security administrator

Explanation:

Security administrator -

In the field of information technology , a security administrator is responsible to control the information technology related security , all the safety issues in the company , is the work profile of a Security administrator.

The person is responsible fight against any malware and virus which can attack the system .

Hence, from the given scenario of the question,

Ian is offered the position of a security administrator.

4 0
3 years ago
Most GUIs provide all of the following except _____.
erma4kov [3.2K]

Hello there! Your answer would be A.

GUIs are Graphical user interfaces. Command prompts are unique to Windows operators, so your best option would be A since the question covers most GUIs.

Hope this helps, have a great day!

7 0
3 years ago
Carly’s Catering provides meals for parties and special events. Write a program that prompts the user for the number of guests a
Savatey [412]

Answer:

Answered below

Explanation:

Scanner n = new Scanner(System.in);

System.out.print("Enter number of guests: ");

int numOfGuests = n.nextline();

double pricePerGuest = 35.0;

double totalAmount = numOfGuests * pricePerGuest;

String event = " ";

if ( numOfGuests >= 50){

event = "Large event";

}else{

event = "small event";

}

System.out.print(numOfGuests);

System.out.println(pricePerGuest);

System.out.println( totalAmount);

System.out.println(event);

6 0
3 years ago
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
Select the correct answer
jonny [76]

Answer:

Obviusly it's option A : blinking your eyes when dust blows

Explanation: coz simple reflexes are prompt, short-lived, and automatic and involve only a part of the body

4 0
3 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • The key requirement in selection of the facilitator is one who is the end-user.
    8·1 answer
  • create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.
    11·2 answers
  • Which microphones are considered to have the best quality?
    12·2 answers
  • A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:
    8·1 answer
  • Does trend in computing important for organization management?​
    8·1 answer
  • What will happen when you run this program?
    12·2 answers
  • BRAINLIEST TO RIGHT ANSWER!! TIMED QUIZ HELP ASAP PLS!!
    5·1 answer
  • It is a type of web page that allows you to share your ideas experiences and beliefs
    9·1 answer
  • Can somebody please help me with these few questions?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!