1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
7

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I

PS systems are the network's specialized security devices.
a.True
b.False
Computers and Technology
1 answer:
RideAnS [48]3 years ago
6 0

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

You might be interested in
To find and engage in Twitter conversations happening in specific geographical areas that are relevant to your company, you shou
Dahasolnce [82]

Answer:

Geo search streams

Explanation:

The " Geo search streams " should be used in Twitter to get involved in conversations happening within a specific geographical areas.

The Geo search streams are tools that can be used to filter out the content or conversations according to the geological locations i.e the filter to choose the  specific region or the regions nearby.

Thus, it will help to find the conversations that are relevant to the the company in the specific geographical area.

6 0
4 years ago
What rule should be followed when determining how many bullets you will include on a slide
stiks02 [169]
They answer to your problem is C
8 0
4 years ago
Read 2 more answers
The permissions of a file in a Linux system are split into three sets of three permissions: read, write, and execute for the own
Reptile [31]

Answer:

Explanation:

def octal_to_string(octal):

   result = ''

   value_letters = [(4, 'r'), (2, 'w'), (1, 'x')]

   for c in [int(n) for n in str(octal)]:

       for value, letter in value_letters:

           if c >= value:

               result += letter

               c -= value

           else:

               result += '-'

   return result

print(octal_to_string(755))

print(octal_to_string(644))

print(octal_to_string(750))

print(octal_to_string(600))

**************************************************

7 0
4 years ago
The Sentence below me is true. <br><br><br> The Sentence above me is false
AnnyKZ [126]
Ok........

Oh now I get it ! :)
4 0
3 years ago
Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
lana [24]

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

4 0
3 years ago
Other questions:
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • ____ are specially denoted text or graphics on a web page, that, when clicked, open a web page containing related content.
    13·1 answer
  • Which of the following is not a good way to conserve fuel and reduce emissions?
    13·2 answers
  • What type of USB connector is always plugged into the computer to connect in external device
    14·1 answer
  • How much memory did the first smartphone have?
    11·1 answer
  • Server 2016 is compatible for Powershell 5.0 State True or False.
    7·1 answer
  • How many syllables does snail have
    12·1 answer
  • HELP
    11·1 answer
  • PLEASE HELP ILL MARK BRAINLIEST!!!
    10·1 answer
  • What would be the printed output of the Python code to the right?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!