1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
12

To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.

Computers and Technology
2 answers:
alexdok [17]3 years ago
7 0

Answer:

To deny a host from sending HTTP traffic destined to a specific server you will need to apply a <u>standard</u> access control list.

Further Explanation:

The access control list is mainly of two types: standard access control list and extended access control list.

Standard access control list is simplest one and used in filtering on source IP address. Therefore, standard access control list is used to grant or deny traffic from a specific source or specific host IP address.

On the other hand extended access control list is used to filter source or destination IP address, different protocols like TCP, UDP and different port numbers like ftp 21, telnet 23 etc.

Learn more:  

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Computer Engineering
  • Subject: Computer Networks
  • Chapter: Data Link Control

Keyword:  

Access control list, htttp, https, host, source, client server, traffic, specific, standard access control list, extended access control list, IP address, host IP, filter, TCP protocol, UDP protocol, port numbers

DedPeter [7]3 years ago
6 0

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


You might be interested in
A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.
Mandarinka [93]

Answer:

decision support system

Explanation:

4 0
3 years ago
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to emai
Anna35 [415]

Answer:

They had to unzip or extract the zipped/ compressed presentation to see it.                          

Explanation:

  • Compressed file or a zip file contains a large file or more than one files that are packed or enclosed that large file or several files into a file or a folder.
  • The compressed file or folder takes less space than the actual large file or set of files.
  • Just as in this scenario the presentation file was larger than the size of what an email file should be. So Tikenya had to compress the file in order to email it to other members.
  • The other members can open the PowerPoint presentation by following any of the below mentioned methods:
  • In Windows to open a compressed file, right click on that file and select Extract All option.
  • File can also be seen by opening that file or folder and dragging that file or folder from the zipped folder to a new location. In Windows this will automatically extract the files.
  • This file can also be opened using a software like WinZip. Download WinZip. Then download the file which is sent in email and double click on that file which will open WinZip wizard dialogue box. Clicking that presentation file from the dialogue box will open another dialogue box confirming the opening of that file. By clicking on OK the presentation file will be opened and can be viewed now.
8 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
To be eligible for the leadership training program offered by the office, a student must have at least 2 years of post-secondary
erica [24]

Answer:

The formula for the given problem is:

=IF(OR(D2>=2,G2>"Yes"), "Yes", "No")

Explanation:

Please see attachment for step by step guide

7 0
4 years ago
RAM IS often referred
miss Akunina [59]
3

thank me later :))))))))
7 0
3 years ago
Other questions:
  • Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a
    9·1 answer
  • a certain battery can supply 6 J of energy to every coulomb of charge moving through a circuit. if the circuit consists of two i
    13·1 answer
  • The combined resistance of three resistors in parallel is: Rt = 1 / ( 1 / r 1 + 1 / r 2 + 1 / r 3 ) Create a variable for each o
    15·1 answer
  • PLEASE HELP 17 POINTS AND ILL MARK BRAINLIEST IF CORRECT , DONT GUESS
    13·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Answer to this problem
    11·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • NEXT
    15·2 answers
  • Which of the following is a quality of a mixed economy?
    5·1 answer
  • Select the correct text in the passage.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!