1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
7

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I

PS systems are the network's specialized security devices.
a.True
b.False
Computers and Technology
1 answer:
RideAnS [48]3 years ago
6 0

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

You might be interested in
Which of the statements is most likely true about the differences between the basic version and premium version of StreamPal
romanna [79]

Answer:

I

Explanation:

8 0
3 years ago
Read 2 more answers
Write C code for a getCommonNeighbors function that accepts two vertex struct pointers, u and v, and returns unordered_set conta
LenaWriter [7]

Answer:

Hi how are you doing today Jasmine

8 0
3 years ago
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the comp
ozzi

Answer:

Redundant networks are generally more reliable.

Explanation:

6 0
3 years ago
Jamal is a graphic designer.a. What hardware tool would you suggest for his computing system? Include an explanation and the cos
Schach [20]

Answer:

Mac computer is the correct answer for option "a" in this question.

Adobe flash is the correct answer for option "b" in this question.

Mac OS  is the correct answer for option "c" in this question.

Explanation:

  • Hardware: Graphic designers must use Mac computers for the best graphic designing.

They support many of the software programs, graphic designers use. Whether the graphic designer chooses Mac or PC, it is important that the computer have a fast processing speed, large amount of hard drive storage and large monitor.

  • <u><em>Cost:</em></u> Approx $5999
  • Software:  Graphic designers must use Adobe flash for the best graphic designing.

Adobe flash help designers easily take graphic design to the Web using basic HTML language.It also helps in motion graphics,web designing etc.

  • <u><em>Cost:</em></u> Adobe Flash is free to install and use. Adobe Flash editing software starts at $99.
  • Operating system: Graphic designers must use Mac OS for the best graphic designing. Mac OS supports most of the software programs and  it inspired Microsoft Corporation to develop its own GUI.
  • <u><em>Cost:</em></u> The current version of Mac OS X costs $29.99 from the Mac's App Store.

3 0
4 years ago
Select the correct answer.
Svetradugi [14.3K]

Answer:

C. Universal

Explanation:

7 0
3 years ago
Other questions:
  • What is the output after the following code executes?
    14·1 answer
  • What kind of fragment is near the computer?
    14·1 answer
  • Write a code that calculates the Greatest Common Divisor (GCD) of two positive integers (user-defined inputs). Include an except
    10·1 answer
  • Who invented napier bone and when​
    14·2 answers
  • Select the correct navigational path to sort data using multiple levels.
    6·2 answers
  • What are 5 different google g-suite tools that you can use to collaborate and communicate with othe
    15·1 answer
  • What is the difference between a threat and an attack?
    7·1 answer
  • You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She acciden
    15·1 answer
  • A ________________ is a special type of array that implements a last-in, first-out collection of values.
    8·1 answer
  • You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the b
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!