1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
5

To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl

y necessary.
True only if the firewall is not from a name brand manufacturer.
False
True
True only if there is no existing hardware inventory in place.
Computers and Technology
1 answer:
Zolol [24]3 years ago
8 0

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

You might be interested in
With a(n) ____, you can enter a value either by typing the value or by selecting it from a list.
oksian1 [2.3K]

Answer:

With a Combo box, you can enter a value either by typing the value or by selecting it from a list.

Explanation:

While working on forms, different types of controls present under the toolbox of development environment are make into use by dragging them onto the form with the help of mouse.

One of the control from toolbox is Combo Box, which is actually a mixture of listbox and a textbox. This means it has properties of both the boxes because the desired value or entity can be written into the combo box manually and it can also be chose from the drop down menu (list) which appears on clicking the small arrow head.

5 0
4 years ago
PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
Fofino [41]

Answer:

She could have given access to the computer to the techician

Explanation:

"as well as any special settings or configurations she thinks may be relevant." This might inculd any information to hack the computer

6 0
3 years ago
You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
MA_775_DIABLO [31]
The answer is b) No

2% of 500 is 10.
$10 interest per year.

There are 12 months in a year. $2 per month
2 * 12 = 24
$24 a year is the fee. 

So, if you have a $10 interest per year, but are paying $24 per year on a fee, you are not getting ahead. 


Hope this helps you! (:
-Hamilton1757
4 0
3 years ago
Read 2 more answers
Which keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the
I am Lyosha [343]

The keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the document  is  Ctrl+G or F5.

<h3>What is a keyboard shortcut?</h3>

Keyboard shortcuts are known to be keys or a set of combination of keys that a person can press on one's keyboard to carry out a specified tasks.

By using keyboard shortcuts , one is often often faster than using a mouse  and  to see the option you are looking for, you have to press Ctrl+G or F5.

Learn more about keyboard shortcut  from

brainly.com/question/12531147

8 0
2 years ago
Which of the following is the java keyword used to declare a class
tekilochka [14]
Class is the java keyword used to declare a class
6 0
3 years ago
Other questions:
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • What does Josh Silverman name as the most important aspect of managing finances?
    10·2 answers
  • In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server. a. request line b.
    8·1 answer
  • Which type of DNS zone resolves host names to IP addresses?
    8·1 answer
  • Who where the romanovs? What happened to them ?
    7·1 answer
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • JAVA
    12·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • Write a function named parts that will take in as parameters the dimensions of the box (length, width, and height) and the radiu
    12·1 answer
  • What is program used to detect and eliminate any viruses or worms trying to infect your computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!