1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
14

The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos

t-based firewall do? [Choose three that apply.]
a. Helps prevent a system from being fingerprinted by port scans
b. Can restrict a computer from receiving network traffic
c. Stops attackers when they are outside of the company's internal network
d. Stop a process or application from launching
e. Disable an account
Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0

Answer:

A.

B.

C.

Explanation:

A host-based firewall is a program that protects a single Internet-connected computer from intruders. It could do the following:

- Help prevent a system from being fingerprinted by port scans

- Restrict a computer from receiving network traffic.

- Stops attackers when they are outside of the company's internal network

Zepler [3.9K]3 years ago
3 0
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
You might be interested in
Which of the following is NOT something you can specify in the bullets and numbering dialog box?
geniusboy [140]

type tool?? not postive


4 0
3 years ago
Drag each tile to the correct box.
Likurg_2 [28]
Learning
planning
designing
developing
testing delivering
4 0
3 years ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
Information that's been collected to help solve a problem is called
Butoxors [25]

Answer:

Data is the correct answer

5 0
2 years ago
You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
satela [25.4K]

Answer:

<em>A checkbox</em>

Explanation:

A checkbox <em>(check box, tick box, tick box) is an User interface widget that allows the user to choose a binary option.</em>

Like a choice between any of two potential options that are mutually exclusive.

For instance, on a simple yes / no question, the user may have to answer ' yes ' (checked) or ' no ' (not checked).

7 0
3 years ago
Other questions:
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    6·2 answers
  • What are the two different frequencies WiFi operates on?
    9·2 answers
  • Markup is best defined as
    11·1 answer
  • Describe an ergonomic consideration for your body while working for long periods in front of a monitor or computer screen?
    14·1 answer
  • The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A wh
    14·1 answer
  • Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highe
    6·1 answer
  • What is a special type of variable used in subroutines that refers to a piece of data?
    15·1 answer
  • The system where the unit of measurement is centimeter
    15·1 answer
  • ¿Qué ayuda nos proporcionan las herramientas tecnológicas en estos tiempo de pandemia? ayudaaaaa plis
    9·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!