1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
6

Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)

Computers and Technology
1 answer:
user100 [1]3 years ago
7 0

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

You might be interested in
This isn't a homework question but rather a technological problem. I connected my device to the motherboard but it will not dete
Helen [10]
Re start the computer again
5 0
4 years ago
Read 2 more answers
What is the pencil tool in photoshop
Mrrafil [7]

Answer:

I think its to draw on the photo.

Explanation:

6 0
3 years ago
Read 2 more answers
Kelly is working on creating a rocket-focused game in Scratch and is ready to add some sound. What should Kelly do if she wants
Alja [10]

Answer:i think she should add a new sound from the soundtab and use the start sound block to attach her sound to the rocket.

Explanation:

8 0
3 years ago
Read 2 more answers
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
3 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
Other questions:
  • When the word “computer” was coined, what did it mean?
    12·1 answer
  • Describe the effect of a pull up resistor
    7·1 answer
  • The content of a text is its
    8·1 answer
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • Use the ________ property in the html link tag to to associate a web page with a style sheet for printing.
    5·1 answer
  • JKJKNJJNJJJLKN;K;L;LHNL;BJ
    5·2 answers
  • Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns hel
    12·1 answer
  • Can people survive without technology?
    5·1 answer
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
  • What is the potential outcome for an author if she uses a word without realizing its connotation? she may write something that s
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!