1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
14

The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos

t-based firewall do? [Choose three that apply.]
a. Helps prevent a system from being fingerprinted by port scans
b. Can restrict a computer from receiving network traffic
c. Stops attackers when they are outside of the company's internal network
d. Stop a process or application from launching
e. Disable an account
Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0

Answer:

A.

B.

C.

Explanation:

A host-based firewall is a program that protects a single Internet-connected computer from intruders. It could do the following:

- Help prevent a system from being fingerprinted by port scans

- Restrict a computer from receiving network traffic.

- Stops attackers when they are outside of the company's internal network

Zepler [3.9K]3 years ago
3 0
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
You might be interested in
Bit stream methods commonly use algorithm functions like the exclusive or operation (__________.
Dmitry [639]
The answer that fits the blank is XOR or Exclusive OR. Exclusive OR is a logical operation wherein it demonstrates the logic presented by "either/or". This means that if the output given is true, either of the inputs, but never both, should also be true.
5 0
3 years ago
Complete the function to return the factorial of the parameter using recursion,
Dominik [7]

def recursiveFactorial(number):

   if number > 0:

       return number * (recursiveFactorial(number - 1))

   else:

       return 1

stringNum = input("Enter a positive integer: ")

num = int(stringNum)

print(recursiveFactorial(num))

I hope this helps!

5 0
3 years ago
Read 2 more answers
True or False? Most operating systems allow the user to specify a set of paths that are searched in a specific order to help res
inessss [21]

Answer:

The correct answer to the following question will be "True".

Explanation:

The "kernel" as shown at the core of your OS would be the central machine program. The program facilitates the essential functions of a computer processor, including coordinating activities, executing programs, and managing devices. This allows users to define a series of directions to try to resolve the connections to running program files in an order of preference.

So, the given statement is true.

4 0
4 years ago
What are the basic computer components that must be purchased in order for the computer to function efficiently?
V125BC [204]
Motherboard
Power Supply
Graphics Card (gpu)
Storage (Hard Drive or Solid State Drive)
Processor (cpu)
RAM

That should be the main components. There are other non-essential ones.

6 0
3 years ago
If you had an idea for a new software company, what would be the best approach to help make it a successful business? develop a
Klio2033 [76]

Answer:

develop a business plan to describe how to maintain and grow revenues

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In the C-SCAN disk scheduling algorithm, the disk arm is required to move in one direction only until it reaches the last track
    7·1 answer
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • Consider the class Money declared below. Write the member functions declared below and the definition of the overloaded +. Modif
    13·1 answer
  • William has an internet connection that does not allow him to make calls when connected to the Internet. What internet service c
    8·2 answers
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • which kind of device does a computer need in order to provide information to a person or something else
    7·1 answer
  • "This part of the computer fetches instructions, carries out the operations commanded by the instructions, and produces some out
    15·1 answer
  • There are 55 registers, and total 60 instructions available in a general-purpose computer. The computer allows only 2-address in
    6·1 answer
  • Which of the following describes a recording scout's job in the music industry?
    5·2 answers
  • What are the different elements of a window?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!