1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
4 years ago
10

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound

traffic?
a) application search
b) application control
c) firewall monitoring
d) virus control
Computers and Technology
1 answer:
defon4 years ago
4 0

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

You might be interested in
Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack
Advocard [28]

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

  • In the first point, the max method is declared that compares the string and returns its max value.
  • In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.
7 0
3 years ago
A for loop is most useful for: A. executing some statements for a specific number of iterations B. executing some statements for
dsp73

Answer:

Option A and C

Explanation:

  • Loops are control structures used to rehash a given area of code a specific number of times or until a specific condition is met. Visual Basic has three principle sorts of circles: for..next circles, do circles and keeping in mind that circles.  
  • For loop is a programming language contingent iterative proclamation which is utilized to check for specific conditions and afterward over and over execute a square of code as long as those conditions are met.
4 0
3 years ago
The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
zysi [14]

Answer:

Following are the solution to this question:

Please find the attachment of this code.

Explanation:

In this code, an email_list method is declared, that accepts a domains parameter, and in the next step, an empty list and two for loop are defined, in which the first for loop is used for a count parameter value and in the second loop is use the append method to add the given value, and use the return method to print its value, and use the print method to call the "email_list" method.  

3 0
3 years ago
Most internet connections use blank transmission
LiRa [457]
Wireless connection I hope I helped!!!
7 0
4 years ago
I WILL UPVOTE!!!!!!!
vekshin1
Any of these can cause a disorder of this degree
6 0
3 years ago
Other questions:
  • Write a function "hailstone"that takes an int "n2"and prints the hailstone sequence. Hailstone Numbers:This sequence takes the n
    15·1 answer
  • Which technology is the basis for XML?
    14·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • Give a big-O estimate for the number of operations,
    5·1 answer
  • Which input device can advanced computer users use instead of a mouse to perform tasks such as opening new windows and saving or
    15·1 answer
  • Taking a picture with a wide aperture creates a shallow depth of field. The subject is up close and in focus and defined while b
    12·2 answers
  • What is the current in a circuit that uses 120V and has 1200W of power?
    6·1 answer
  • Untuk memberikan keterangan pada bagian bawah halaman dokumen yg akan diulangi pada setiap halaman dokumen yg digunakan fasilita
    8·2 answers
  • Match the parts of a CPU to their functions. Thanks in advance.
    7·1 answer
  • The base position for your fingers to be placed on a keyboard is called<br> 2 point
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!