1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
9

Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H

owever, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause? O The IP address of the service is blocked by an intrusion detection system (IDS) O The service is blocked by the Internet Service Provider (ISP) O The proxy firewall on the network is blocking the service. O The host-based firewall settings are blocking the service. Submit Refer to the exhibit. Which of the following networking device is being shown in the middle in red color? Gataway AV Anispyware Email'Antispam filering Routing capetivities FS Wob searty OuSBandwidth anagement O UTM appliance Switch Hub Modem Router Submit
Computers and Technology
1 answer:
Sindrei [870]3 years ago
7 0

Answer:

The host-based firewall settings are blocking the service

Explanation:

Host-based firewall settings can be configured on each workstation. The firewall can be provided by the operating system itself, or it can be a standalone software package that provides security features and functionality for the device's network connection. If this firewall contains incorrect settings, legitimate services can be blocked, and if so, a message will usually notify the user of such a breach. In these cases, the firewall settings need to be adjusted to make the desired service work.

You might be interested in
Which is an example of a variable name written in camelcase?
NemiM [27]

Answer:

Option (a) myCar

Explanation:

Option (a) is Correct

If there are two or more words in variable we can use camel case to declare the variable. In camel case first character of first word is either a lowercase alphabet or underscore (_) and first character of second word is a uppercase alphabet. ex: empNum, myCar

So the Option (a) myCar is correct among the given options

Option (b) is incorrect

Since both the first letter of two words are in lower case which is not according to camel case rules

Option (c) is incorrect

The first letter of first word is in lower case first character of second word is a uppercase alphabet but there is a gap so it is not valid .

Option (d) is incorrect

The first word is in upper case and first character of second word is a uppercase alphabet it is not valid.

6 0
3 years ago
Read 2 more answers
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
Explain the risks to privacy from collecting and storing personal data on computer systems and the programmer’s role to safeguar
Deffense [45]

Answer:

The risks is If your computer is stolen, someone  could get the data and If your laptop messes up you will you lose all the data.

Explanation:

7 0
3 years ago
How the full address space of a processor is partitioned and how each partition is used?
Sati [7]

Answer:

?

Explanation:

?

6 0
3 years ago
What is the output of the following code fragment? int i = 1; int sum = 0; while (i <= 11) { sum = sum + i; i++; } System.out
valentina_108 [34]

Answer:

The value of sum is 66

Explanation:

i = 1

sum = 0

while (i <= 11) {  

sum = sum + i;

i++;  

}

i = 1

  • sum = sum + i
  • sum = 0 + 1
  • sum = 1

i = 2

  • sum = sum + i
  • sum = 1 + 2
  • sum = 3

i = 3

  • sum = sum + i
  • sum = 3 + 3
  • sum = 6

i = 4

  • sum = sum + i
  • sum = 6 + 4
  • sum = 10

i = 5

  • sum = sum + i
  • sum = 10 + 5
  • sum = 15

i = 6

  • sum = sum + i
  • sum = 15 + 6
  • sum = 21

i = 7

  • sum = sum + i
  • sum = 21 + 7
  • sum = 28

i = 8

  • sum = sum + i
  • sum = 28 + 8
  • sum = 36

i = 9

  • sum = sum + i
  • sum = 36 + 9
  • sum = 45

i = 10

  • sum = sum + i
  • sum = 45 + 10
  • sum = 55

i = 11

  • sum = sum + i
  • sum = 55 + 11
  • sum = 66

i = 12 --> does not comply with the condition "i < = 11", the while loop is over

7 0
3 years ago
Other questions:
  • What is a computer that provides services and connections to other computers on a network is called a ________ ?
    7·1 answer
  • Which type of message format is designed to arouse curiosity, not showing the product or delivering quite enough information to
    10·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • When typing the Works Cited in a report, set a .5" ______ indent. *
    12·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • When trying to remember a list of words, a person may choose a word to which they "hang" their memories on. This type of mnemoni
    11·1 answer
  • Choose the missing words in the code below.
    12·1 answer
  • Plz help
    14·2 answers
  • What is big data life cycle?​
    9·1 answer
  • Assuming there are 7.481 gallons in a cubic foot. Write a program that asks the user to enter a number of gallons, and then disp
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!