1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
14

The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos

t-based firewall do? [Choose three that apply.]
a. Helps prevent a system from being fingerprinted by port scans
b. Can restrict a computer from receiving network traffic
c. Stops attackers when they are outside of the company's internal network
d. Stop a process or application from launching
e. Disable an account
Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0

Answer:

A.

B.

C.

Explanation:

A host-based firewall is a program that protects a single Internet-connected computer from intruders. It could do the following:

- Help prevent a system from being fingerprinted by port scans

- Restrict a computer from receiving network traffic.

- Stops attackers when they are outside of the company's internal network

Zepler [3.9K]3 years ago
3 0
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
You might be interested in
Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
RSB [31]

Answer:

From Networkopoint of view, a node is a redistribution point or communication point or a connection point.

It can also mean devices or data points on a large network Such as laptop, phones, printers, etc

Explanation:

3 0
4 years ago
The most common cause of foodborne illness is
nignag [31]

Answer:

Food posioning

Explanation:

8 0
4 years ago
Read 2 more answers
If a priority queue is being implemented using an unordered list, what is the Big-O complexity of the Enqueue operation?
lidiya [134]

Answer:

<u>the answer is O(1)</u>

Explanation:

A priority queue is a type of queue whereby each of the elements are linked with a priority and the elements are served according to their priority.

The word enqueue means to add elements to the back of the queue

<em><u>For this question, while using an unordered list, O(1) is the big-O complexity of the enqueue operation. O(1) is a natural Choice for queues.</u></em>

6 0
3 years ago
- Truncate command response time is ______ as comparedto Delete command.
MArishka [77]

Answer:

c. Better

Explanation:

Truncate command response time is better as compared to Delete command.

8 0
3 years ago
You should avoid “S” curves in your photographs. True or False?
WINSTONCH [101]

Answer:

The answer to this question is false.

Explanation:

The S-curve is the natural curve of some object. S-curve is a line or path of the image that curves backward and onward horizontally. we can proceed vertically as much similar to the word S. It is exactly like the letter S. It is not a bad thing. So the S curve is not avoiding in the photographs.  

5 0
3 years ago
Other questions:
  • In the context of prototyping during the design phase of the systems development life cycle (SDLC), a _____ prototype shows user
    14·1 answer
  • In Windows Server 2016, what must be running to allow you to manage a server remotely with PowerShell?
    14·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
    14·1 answer
  • What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
    10·1 answer
  • Ask the user to enter 3 scores each representing an assignment score. Ask the user for their midterm and final exam. Store all a
    11·1 answer
  • When considering the best technology for its particular use, what should a business consider
    15·2 answers
  • Consider the following recursive method.
    14·1 answer
  • DO YOU EVER FEEL LIKE A PLASTIC<br> DRIFTING THROUGH THE WIND, WANTING TO START AGAIN
    6·2 answers
  • What is a key differentiator of Conversational Artificial Intelligence (AI)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!