1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
13

You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?

Computers and Technology
1 answer:
grin007 [14]3 years ago
5 0

Windows 8 Firewall rules that can be defined include;

Inbound Rules

Outbound Rules

Connection - specific Rules

Inbound Rules – Type of rules that help protect your PC from other computers from making unsolicited connections to it.

Outbound Rules – They help protect your PC by preventing it from making unsolicited connections to other computers.

Connection – specific rules – These rules help a computer admin to create and apply custom rules based on a particular connection.


You might be interested in
If your vehicle has fuel injection and the engine is cold,
olga nikolaevna [1]
D. Press the accelerator to the floor once and release it.
6 0
4 years ago
What is the function of tab?<br>​
Sholpan [36]

Answer:

The function of the tab is used to advance the cursor to the next tab key.

5 0
1 year ago
Which of these is an online presentation tool?
Marina86 [1]
Google slides is and online presentation tool
5 0
3 years ago
Read 2 more answers
an attacker uses the nslookup interactive mode to locate information on a domain name service (dns). what command should they ty
sashaice [31]

The command should they type to request the appropriate records for only the name servers is  set type=ns .

<h3>What is Domain Name Service?</h3>

The hierarchical and decentralized naming scheme used to identify machines reachable over the Internet or other Internet Protocol networks is called the Domain Name System. Domain names are linked to various types of information by resource records in the DNS.

The application service known as DNS transforms an IP address into a more recognizable and memorable name. When utilizing the Internet, any uniform resource locator (URL) entered into any Web browser's location box will be converted into a specific IP address by one of the millions of DNS servers.

Both interactive and non-interactive modes of Nslookup can be used. Enter nslookup at the command line and press return to use in interactive mode. An nslookup command prompt ought to appear. At the command prompt, type nslookup options to use in non-interactive mode.

Hence, The command should they type to request the appropriate records for only the name servers is  set type=ns .

To learn more about Domain Name Service refer to:

brainly.com/question/13883687

#SPJ4

6 0
2 years ago
A person who uses computers to gain unauthorized access to data.
Anastaziya [24]

Answer:

Hacker

Explanation:

They break password codes to get access to unauthorized data.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What makes it possible for e-mail to be sent and received on a wide variety of devices, including cell phones, PDAs, laptops, an
    12·1 answer
  • You should adopt naming standards that do not convey information to potential system attackers.
    14·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    15·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • What are at least three differences between a personal and non-personal blog?
    5·1 answer
  • A source A producing fixed-length cells is required to use a Token Bucket Traffic Shaper (TBTS) of bucket capacity b=20 cell tok
    15·1 answer
  • Which keyword lets you control the number of rows that are returned by a query?
    10·1 answer
  • A database record can best be described as:
    11·1 answer
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • Select the correct navigational path to create the function syntax to use the IF function.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!