1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
14

The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos

t-based firewall do? [Choose three that apply.]
a. Helps prevent a system from being fingerprinted by port scans
b. Can restrict a computer from receiving network traffic
c. Stops attackers when they are outside of the company's internal network
d. Stop a process or application from launching
e. Disable an account
Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0

Answer:

A.

B.

C.

Explanation:

A host-based firewall is a program that protects a single Internet-connected computer from intruders. It could do the following:

- Help prevent a system from being fingerprinted by port scans

- Restrict a computer from receiving network traffic.

- Stops attackers when they are outside of the company's internal network

Zepler [3.9K]3 years ago
3 0
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
You might be interested in
In most signal "timing diagrams" (like the one below) the signals do not change from low to high, or from high to low, abruptly.
melisa1 [442]

Explanation:

This transient state occurs due to the fact that the signal change from low to high and high to low doesn't occur intermediately but in a very small time, in relation to the signal time itself.

At transistor level there are parasitic (undesired) capacitances and resistances, formed due to the layout configuration of conductor and dielectrics. As consequence a RC circuit is formed, thus making a propagation delay.

This delay must be characterized for each circuit, and specified as tpHL (transition time from High to Low) and tpLH (transition time from Low to High)

8 0
3 years ago
What is smallpdf(app) for? How can I use it? ​
Fynjy0 [20]
Smallpdf app is. For windows
Go to your homepage and click a tool
Drag a file into the colored toolbox
Most tools should start working on the file right away
For some tools, further optimization options may be available
Download the converted doc to your local drive
O
)
O
8 0
3 years ago
URGENT!!!! What is the concept of using the internet to trade goods and services called?​
NeTakaya

Answer:

barter

Explanation:

is the direct trade of goods, services and resources without the use of money

5 0
3 years ago
Users connecting to a particular SSID are now claiming they cannot see the SSID. What should a technician do first, assuming the
Alexus [3.1K]

Answer:

Move closer to the wireless access point

Explanation:

6 0
4 years ago
With consideration to Ethernet, why is it necessary to have a common language for communication across devices
Travka [436]

Yes the ansewer is c bc you can look it up!

3 0
3 years ago
Other questions:
  • Approximately what percent of U.S. businesses have some form of remote work program? (from Chapter 1)
    14·1 answer
  • A user is trying to delete a file located on an NTFS volume on his Windows 8 computer but is unable to do so. Why is this?
    6·1 answer
  • How is the numeric string that makes up a digital signature created?
    5·1 answer
  • What is an allocation unit?
    10·1 answer
  • What is a programming language?
    11·2 answers
  • 1. You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory c
    13·2 answers
  • Which of the following is the last step in creating a budget?
    13·1 answer
  • Anybody know this? Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. M
    11·1 answer
  • Select the correct answer.
    10·1 answer
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!