1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
10

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound

traffic?
a) application search
b) application control
c) firewall monitoring
d) virus control
Computers and Technology
1 answer:
defon3 years ago
4 0

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

You might be interested in
Which of the following is a reason to use storyboarding? (Select all that apply)
fomenos

Answer:

To have all your ideas in one place

To conceptualize design ideas

To present ideas to a client

Explanation:

A storyboard refera to a graphic organizer which consists of images which are displayed in sequence in order to pre-visualise an animation, motion picture, etc.

It is important as it conveys how a story will flow, and also help in conceptualizing design ideas. Based on the options given, the correct options are:

• To have all your ideas in one place

• To conceptualize design ideas

• To present ideas to a client

3 0
3 years ago
HURRY IM TIMED Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According
Sloan [31]

Answer:

1 and 3 are the answers

4 0
3 years ago
Read 2 more answers
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
4 years ago
SHA-1 gives 160-bit secure hash. Let's assume that a successful brute force attack is possible by trying 2^(160/3) combinations.
pochemuha

Answer:

C) double SHA-1 is stronger because it requires about 2^(160/3) X 2^(160/3) maximum combinations because for each broken first stage, there are 2^(160/3) brute force attempts may be needed.

Explanation:

Double SHA will require about 2^(160/3) X 2^(160/3). for each statage we need to check the 2^(160/3) combinations means it will take lot of time.

4 0
3 years ago
In the bussiness cycle which term best fits the labeled point on the graph
andrew11 [14]
In the business cycle, the term that best fits the labeled point on the graph of Production output vs Time is Contraction
8 0
2 years ago
Other questions:
  • How do i connect wifi direct from pc to phone​
    15·1 answer
  • Zack is working on an assignment at school. He wants to save his work so he can take it home and complete it on his home compute
    13·1 answer
  • A file extension of .xlsx means that the file contains what? *
    12·2 answers
  • Bitlocker uses the computer's __________ chip to store encryption keys and does not rely on individual user credentials. securit
    10·1 answer
  • What role does the agenda play in a webinar??
    14·1 answer
  • State and derive the law of conservation of energy​?
    8·2 answers
  • I need your help with the following homework assignment:
    9·1 answer
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Write a program that will input miles traveled and hours spent in travel. The program will determine miles per hour. This calcul
    5·1 answer
  • write sql commands for the following: a. create two different fom1s of the insert command to add a student with a studen t id of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!