1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
10

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound

traffic?
a) application search
b) application control
c) firewall monitoring
d) virus control
Computers and Technology
1 answer:
defon3 years ago
4 0

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

You might be interested in
Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "non-negative" otherwise. Ex:
ArbitrLikvidat [17]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 

 System.out.print("Enter a number: ");

 int userVal = input.nextInt();

 

 String aString;

 if(userVal < 0)

     aString = "negative";

 else

     aString = "non-negative";

     

 System.out.println(aString);

}

}

Explanation:

Ask the user to enter a number and set it to userVal

Check the value of userVal. If it is smaller than 0, set the string as "negative". If it is not, set it as "non-negative"

Print the string

8 0
3 years ago
If you were going to construct a table that only included shape names with number prefixes, which shape would you include
NikAS [45]
The answer would be A. square
3 0
3 years ago
Robert's got a quick hand
Alina [70]
verry
good
song
love
it
6 0
3 years ago
Read 2 more answers
Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2016 server. What capabili
Marina86 [1]

Answer:

The answer is "Clustering"

Explanation:

Clustering is a technique, which includes the Microsoft Windows and the coordination with an individual multi-PC's, that is mostly connected to the local area network, as a single platform.

  • It is cheaper than one device.
  • It enables you to greater machine performance and increases usability and reliability, that's why the answer to this question is "Clustering".
4 0
3 years ago
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
3 years ago
Other questions:
  • Python
    14·1 answer
  • Which of the following describes a BYOD?
    15·1 answer
  • 6. Sandra did a survey to see how
    9·1 answer
  • How many questions must you answer in Brainly to be able to message people?
    6·2 answers
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Reading (BCK FORM 2C IT 2020-2021)
    12·2 answers
  • Ethan is coding in Python and trying to add a set of numbers including both floats and integers. What should he do to make sure
    12·1 answer
  • How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural lang
    13·1 answer
  • Following Aristotle,man by nature is a political animal,justify the above claim in the light of the Russian invasion of Ukraine
    13·1 answer
  • you want to run your campaign for your dry-cleaning service across three different publishers, each with different video creativ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!