1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
9

Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H

owever, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause? O The IP address of the service is blocked by an intrusion detection system (IDS) O The service is blocked by the Internet Service Provider (ISP) O The proxy firewall on the network is blocking the service. O The host-based firewall settings are blocking the service. Submit Refer to the exhibit. Which of the following networking device is being shown in the middle in red color? Gataway AV Anispyware Email'Antispam filering Routing capetivities FS Wob searty OuSBandwidth anagement O UTM appliance Switch Hub Modem Router Submit
Computers and Technology
1 answer:
Sindrei [870]3 years ago
7 0

Answer:

The host-based firewall settings are blocking the service

Explanation:

Host-based firewall settings can be configured on each workstation. The firewall can be provided by the operating system itself, or it can be a standalone software package that provides security features and functionality for the device's network connection. If this firewall contains incorrect settings, legitimate services can be blocked, and if so, a message will usually notify the user of such a breach. In these cases, the firewall settings need to be adjusted to make the desired service work.

You might be interested in
Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in t
artcher [175]

Answer:

Explanation:

The following Python program uses a combination of dictionary, list, regex, and loops to accomplish what was requested. The function takes a file name as input, reads the file, and saves the individual words in a list. Then it loops through the list, adding each word into a dictionary with the number of times it appears. If the word is already in the dictionary it adds 1 to its count value. The program was tested with a file named great_expectations.txt and the output can be seen below.

import re

def wordCount(fileName):

   file = open(fileName, 'r')

   wordList = file.read().lower()

   wordList = re.split('\s', wordList)

   wordDict = {}

   for word in wordList:

       if word in wordDict:

           wordDict[word] = wordDict.get(word) + 1

       else:

           wordDict[word] = 1

   print(wordDict)

wordCount('great_expectations.txt')

4 0
3 years ago
75,15,25,5,15 what's next
Fittoniya [83]

Answer:

3

Explanation:

The sequence seems to follow a 2-step pattern.

1)Divide the first number by 5 to get the second number.

2)Add 10 to the second number to get the third number.

75/5 = 15

15 + 10 = 25

25/5 = 5

5 + 10 = 15

---> 15/5 = [3] (Answer)

3 0
2 years ago
For what purpose is IT used in business?
stealth61 [152]

Answer:

manufacturing

improving

customer care

transportation

human resource management

Explanation:

business communication use technology to improve their services or products as a way of gaining competitive advantage.

6 0
3 years ago
When are computers most vulnerable to threats or damage?
valentinak56 [21]
With virus protection
8 0
3 years ago
Write a code to load Shepp Logan phantoms and use the radon transform for parallel beam to generate a sinogram for 360 degree ro
jeyben [28]
他們也在週四在家休息時間接受媒體訪問時指出,他們
6 0
2 years ago
Other questions:
  • Djdjdjdjdjdjdjdjdjjdjdjdjdjdjdjdjdjdjdj
    13·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of yo
    12·1 answer
  • In the Word 2016 window, where is the Status bar located?
    11·1 answer
  • A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
    7·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • What does it mean to prioritize tasks?
    12·2 answers
  • If we need to manage a contiguous range of memory, handling requests to allocate various sized chunks, and later make those chun
    12·1 answer
  • Que es el sistema persona producto?​
    8·1 answer
  • How to make your nest learning thermostat stop doing something
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!