1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
15

you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid

e and will filter out specified port ranges. what technology will enable this
Computers and Technology
1 answer:
Lisa [10]3 years ago
6 0

Normally network administrator or IT administrator port protections are done at firewall level or Domain server.

<u>Explanation:</u>

When port security is done in space server, at the time end-client login the port access is denied so the end-client is limited to get to the particular port or scope of ports. All workstation or work area or PC is associated with the space server and got to in the associations.  

An equipment firewall is a unit that is associated between the system and the gadget for interfacing with the Internet. A product firewall is a program that is introduced on the PC with an Internet association.  

When port insurance is tended to in space server-level no compelling reason to design is end-client level. When the client login consequently area server content runs once at an end-client level during login time.

You might be interested in
The it components of an erp system architecture include the hardware, software and the ________
natta225 [31]

The components of an ERP system architecture is made up of the hardware, software and the Data.

<h3>What is an ERP system?</h3>

Enterprise resource planning (ERP) is known to be a kind of  software that firms often use to handle or manage day-to-day business works such as accounting and others.

Note that The components of an ERP system architecture is made up of the hardware, software and the Data.

Learn more about  ERP system from

brainly.com/question/14635097

#SPJ12

6 0
2 years ago
A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
Mama L [17]

Answer:

Replace the printhead is the correct answer.

Explanation:

Because in the following statement, that person is from the department of the accounting then, he call the technician regarding the problem occurs in the printer which is dot-matrix printer and when he examined the dot-matrix printer and replace the printhead because when he print any document then, he finds that some letters have missing from the page.

5 0
3 years ago
"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard
Jobisdone [24]

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

4 0
2 years ago
What game is the best for racing and modifying cars
sleet_krkn [62]

Answer:  it is Forza Horizon 4. ...

Best Car Games

1.Forza Horizon 4

2. Grand Theft Auto V

3. Need For Speed Payback

4. Car Mechanic Simulator

5. Forza Horizon 4

6. Rocket League

Explanation:

6 0
2 years ago
Which of the following is a valid byte?<br><br> 11100<br> 11011011<br> 00000000<br> 10022011
SVETLANKA909090 [29]

Answer:

11011011

00000000

Explanation:

10022011 cant be an answer because bits are composed of 0s and 1s

and 11100 is too small.

3 0
2 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Viet drives around and checks meters to document the amount of electricity used in homes. What Energy pathway is he a part of? E
    9·2 answers
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • __________ refers to excavating the sides of an excavation to form one or a series of horizontal levels or steps, usually with v
    12·2 answers
  • Excel assigns the name ____ to the first excel table created in a workbook.
    10·1 answer
  • Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
    11·1 answer
  • Someone plzzzz help me
    5·1 answer
  • Use the drop-down menus to complete the statements about changing mail options in Outlook.
    10·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • Select the three concepts of capital outlay.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!