1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
5

To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl

y necessary.
True only if the firewall is not from a name brand manufacturer.
False
True
True only if there is no existing hardware inventory in place.
Computers and Technology
1 answer:
Zolol [24]3 years ago
8 0

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

You might be interested in
What would be a situation in which you could use an excel chart to present your data
Pavlova-9 [17]
Having to compare results on experiments or lab tests to each other.
5 0
3 years ago
Read 2 more answers
Answer this question for points lol
Zanzabum

Explanation:

jxjxnxnxnxkxozj nxkakthanksssssss lolll

8 0
3 years ago
Read 2 more answers
A. True
vitfil [10]
The answer would be True.
8 0
3 years ago
What is the cpu used for
Dahasolnce [82]

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.

4 0
3 years ago
A hard drive that is running slowly may not have been
Anuta_ua [19.1K]
Plugged in i think is the answer
7 0
3 years ago
Read 2 more answers
Other questions:
  • When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request
    14·1 answer
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • Modify the NumberedList class we implementd during the lecture by adding a member function: void NumberedList::insertPosition(in
    13·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a c
    6·1 answer
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • The output of a computer can be seen on ( monitor, keyboard or mouse )​
    5·2 answers
  • If a password is entered wrongly three times the computer will
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!