1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
6

Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)

Computers and Technology
1 answer:
user100 [1]3 years ago
7 0

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

You might be interested in
When using linear or reciprocal navigation, what should be the interface include?
Alex_Xolod [135]
The answer to the question is A
5 0
3 years ago
1. Which markup language adds the ability to use video without requiring the user to download add-ons?
aniked [119]

HTML5

HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element  too that allows pages to smoothly add audio files.

3 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
inessss [21]
<h2>Answer:</h2><h2>Releases a new video of its new high - tech manufacturing facility; To create a customer alert about a new program. </h2>

<h2>2)Hosts an online sweepstakes. .....;To increase brand loyalty </h2>

<h2>3)Gives bloggers.....:To give customers a peek into its operation.</h2>

<h2>4)Asks customers to determine their. .....;To allow customers to be part of the product development. </h2>

8 0
3 years ago
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacke
Mice21 [21]

Answer:

URL hijacking

Explanation:

Based on the information provided within the question it can be said that in this scenario they seem to be using an attack known as URL hijacking. This attack, also known as "typosquatting", is when someone takes advantage of individual's typos when searching for popular sites, in order to get them to go to their site which generates them money the more traffic they get.

5 0
3 years ago
6. Assume a processor supports all instructions and addressing modes. A program consists of 25% store words, 15% load words, 10%
Sloan [31]

Answer:

After checking the attached picture, come to this calculated "Total Time".

Total time 'T'

T = (0.25)(200) + (0.15)(200) + (0.1)(250) + (0.05)(175) + (0.45)(75)

T = 147.5 ps

8 0
3 years ago
Other questions:
  • Lance has three tables in his database he wants to generate a report to show the data from the three table so he decides to link
    6·2 answers
  • Define the acronym WAECUP and its components
    15·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • ​Microsoft claims that the microsoft project software can _____.
    11·1 answer
  • When storing used oil, it needs to be kept in ___________ containers.
    12·1 answer
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    7·1 answer
  • In which drawer can you set certain lights to light up on your micro:bit?
    12·2 answers
  • What are benefits of virtualizing servers ?
    5·1 answer
  • Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
    12·1 answer
  • What type of computer is IBM 1401 ?<br><br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!