1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
5

To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl

y necessary.
True only if the firewall is not from a name brand manufacturer.
False
True
True only if there is no existing hardware inventory in place.
Computers and Technology
1 answer:
Zolol [24]3 years ago
8 0

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

You might be interested in
What are the network topologies? Advantages and disadvantages.
s344n2d4d5 [400]
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.

Advantages:

It is easy to handle and implement.

It is best suited for small networks.

Disadvantages:

The cable length is limited. This limits the number of stations that can be connected.

This network topology can perform well only for a limited number of nodes.
6 0
2 years ago
A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
irina1246 [14]

The “Allow changes by more than one user at the same time” option.


In a group of users, it is very important to create a shared workbook so that several people are able to update information and track changes in the workbook at the same time. To do so, one should click on the review tab of the excel sheet and select share workbook. On the editing tab of the share workbook dialog box, select the Allow changes by more than one user at the same time check box. Go ahead and click the advanced tab and select option you would want to use and then click OK

 






4 0
3 years ago
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
The website of an international human rights organization stores a large database of information and provides search functionali
ValentinkaMS [17]

Answer:

False.

Explanation:

The website of an international human rights organization stores a large database of information and provides search functionality to make it easier for their visitors to locate desired information. However, this approach fails to be effective since the search functionality is limited to the website rather than the whole web is a False statement.

3 0
3 years ago
When using bits to represent fractions of a number, can you make all possible fractions?
saw5 [17]
This is your perfect answer

8 0
2 years ago
Other questions:
  • What does that program print out?<br><br> a) 2<br> b) 3<br> c) 4<br> d) 8
    14·2 answers
  • To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then pr
    7·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • Calculate the maximal size of a file if we have:
    6·1 answer
  • Computer technology has changed our lives write of a least five ways to show how this is so​
    15·1 answer
  • Identify what a computer needs to
    14·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • The concept of "plug and play" is demonstrated by which of the following<br> scenarios?
    13·1 answer
  • 30 points Fill in the blanks,<br> Plz leave a explanation
    5·2 answers
  • Create a vector of structures experiments that stores information on subjects used in an experiment. Each struct has four fields
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!