1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
4 years ago
13

What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo

r that communication? 1 point informed consent implicit deny separation of duties least privledge
Computers and Technology
1 answer:
NemiM [27]4 years ago
7 0

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

You might be interested in
"Write an SQL query that displays the Ssn and Last name of all employees who is a supervisor of a Department Manager"
Karo-lina-s [1.5K]

Answer:

SELECT Ssn,

             Last_name

 FROM employees

WHERE position = supervisor;

Explanation:

SELECT is an SQL query statement that is used to initiate the display of wanted variables.

The names of the variables often succeed the SELECT statement and they are separated by commas.

FROM is an SQL query statement that indicates the table fro which the selected variables be displayed.

WHERE is used to filter your search and return only rows that meet the criteria.

; signifies the end of a query and calls for an execution.

3 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
4 years ago
Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes us
Lynna [10]

Answer:

cs

Explanation:

5 0
3 years ago
Which of the following is NOT foundwithin the content pane?labelstitlebartextareasbuttons
HACTEHA [7]

Answer: Title bar

Explanation: Content pane is like a content box with certain features containing the object and knowledge about it. It is usually referred with several factors like labels , text, buttons etc to load the data in the dynamic way. These features are  present within the content pane. The only feature outside the content pane is title bar and thus is not found in content pane.

3 0
3 years ago
White a function the will accept three arguments, two numbers and an operation sign among "+", "-", "/", and "x". The function s
Setler79 [48]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

def calc(n1, op, n2):

   if op.lower() == "x":

       return n1*n2

   elif op == "+":

       return n1+n2

   elif op == "-":

       return n1-n2

   elif op == "/":

       return n1/n2

   else:

       return "error"

num1 = float(input("Input first number: "))

oper = input("Input operator: ")

num2 = float(input("Input second number: "))

print(calc(num1, oper, num2))

4 0
3 years ago
Other questions:
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • The danger in using soy solvents is that they: A) Are not approved by the FDA B) Take paint off of surfaces where used C) Are no
    11·2 answers
  • In 2007, __________ Floridians were injured in alcohol-related collisions.
    6·2 answers
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • If you inadvertently rename a file that is associated with certain apps, the apps may not be able to find the file and may not r
    7·2 answers
  • First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==> Close All Projects).
    6·1 answer
  • Which of the below statements describes the purpose of HTML 5 - check as many as apply
    9·1 answer
  • For local patterns that change quickly, these methods are preferred 1. data driven 2. model drive 3. trend and seasonality drive
    10·1 answer
  • The following loop is intended to print the numbers 1, 2, 3, 4, 5.
    11·1 answer
  • One of 34 possible _________________ can be assigned to each axis of classification in the seven-character code.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!