1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
14

The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos

t-based firewall do? [Choose three that apply.]
a. Helps prevent a system from being fingerprinted by port scans
b. Can restrict a computer from receiving network traffic
c. Stops attackers when they are outside of the company's internal network
d. Stop a process or application from launching
e. Disable an account
Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0

Answer:

A.

B.

C.

Explanation:

A host-based firewall is a program that protects a single Internet-connected computer from intruders. It could do the following:

- Help prevent a system from being fingerprinted by port scans

- Restrict a computer from receiving network traffic.

- Stops attackers when they are outside of the company's internal network

Zepler [3.9K]3 years ago
3 0
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
You might be interested in
How can we style the images and layouts of our pages?
professor190 [17]

Answer

Using CSS and Html:)

Explanation:

4 0
3 years ago
susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
omeli [17]

The recursive formula of the explicit formula A_n = 3 + 2n is A_n = A_{n-1} + 2

The explicit formula is given as:

A_n = 3 + 2n

When n = 1, we have:

A_1 = 3 + 2(1)

A_1 = 5

When n = 2, we have:

A_2 = 3 + 2(2)

A_2 = 7

When n = 3, we have:

A_3 = 3 + 2(3)

A_3 = 9

So, we have:

A_1 = 5

A_2 = 7

A_3 = 9

Rewrite the functions as follows:

A_1 = 5

A_2 = 5 + 2

A_3 = 7 + 2

So, we have:

A_1 = 5

A_2 = A_1 + 2

A_3 = A_2 + 2

Express 2 as 3 - 1

A_3 = A_{3-1} + 2\\

Substitute n for 3

A_n = A_{n-1} + 2

Hence, the recursive formula is A_n = A_{n-1} + 2

Read more about recursive and explicit formulas at:

brainly.com/question/11235928

7 0
3 years ago
What is the purpose of copyfitting?
stiv31 [10]

Answer:

ms word can help you to writer and print

ur document and make u more attractive

Explanation:

a

3 0
3 years ago
You are installing several servers that will be used as web servers to reach customers over the Internet. Where should you place
just olya [345]

Answer: DMZ

Explanation:

 DMZ is the demilitarized zone network and it is use in providing he various services to the users or customers by using the public internet. It basically contain organizational services in the logical and physical sub-network and usually works in large network.

The main purpose of DMZ that it is use as web server over the internet for reaching to the users and customers. It also add one additional layer in the organization for security purpose.

Some of the services that DMZ provides as web server, DNS and proxy server.  

4 0
3 years ago
How has the Internet changed the design industry?
Alexandra [31]
<span>Loads of ‘easy to use’ programmes and ‘How To’ guides make it simple for anyone to put a brochure/newsletter/marketing piece together – how difficult can it be with so much help available? Technology has not only changed the way designs are accomplished, it’s changed the perception of ‘design’ from a hard earned skill to something you can learn in an afternoon off.

via </span>https://dmjcomputerservices.com/blog/technology-changed-design-industry/

4 0
3 years ago
Other questions:
  • The computers connected to the main server are called ______.
    14·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • The chemical symbol H represents which of the following elements?
    9·2 answers
  • In an AND truth table.
    7·1 answer
  • You have answered 4 of 18 questions.
    12·2 answers
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • A rectangle indicates a single process.true or false​
    7·2 answers
  • The RGB value below produces a shade of purple. What does the number 175
    15·2 answers
  • Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overl
    10·1 answer
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!