1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
10

A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a

ctivities. The signature is applied across the corporate campus regardless of the type of web browser used. What type of triggering mechanism is being implemented?
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
6 0

Answer:

Policy based

Explanation:

Triggering mechanism is a vital tool in information technology automation. It is used to activate an action or event at the instant occurrence or triggered by another event.

There are various types of triggering mechanism used, they are dynamic, intensity-based, observer-based, policy-based triggering mechanism etc.

The policy-based triggering mechanism describes a triggering mechanism that defines a trigger based on standard policies or patterns, for an event or events to take place.

Sergio039 [100]3 years ago
3 0

Answer:

policy-based

Explanation:

The policy-based triggering mechanism is actually dependent on the operation that the intended user wants to achieve. It is configured by defining an already intended pattern, in this case, it is web surfing activities, and as earlier stated, it is configured according to what is intended, like the name suggests "policy-based".

You might be interested in
State the keyboard key used to move the cursor to the line​
irina [24]

Answer:

Home & End are used to move the cursor to the start and end of a line

4 0
3 years ago
Insurance can help you:
seraphim [82]
Yes insurance can help you
3 0
3 years ago
Read 2 more answers
Spoderman memes<br> im scared-
DENIUS [597]

Don't be afraid of spooderman. He's hot.

4 0
3 years ago
Read 2 more answers
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
3 years ago
In Java, write a AllDigitsOdd program that has a method called allDigitsOdd that takes an integer and returns whether every digi
yan [13]

Answer:

Hi there! The solution for this problem can be implemented a number of ways. Please find my solution below along with the explanation.

Explanation:

The prompts are fairly easily implemented using the Scanner class in Java for user input. In the allDigitsOdd function, we can perform a Math operation on the number being passed into the function to determine the number of digits in the number. We use the log10 function to do this and convert the double value returned to int. This is calculated in the code below as:  "(int)(Math.log10(number) + 1); ". Once we have the number of digits, we write a simple loop to iterate over each digit and perform a modulus function on it to determine if the digit is odd or even. I have declared 2 variables call odd and even that get incremented if the mod function (%) returns a 1 or a 0 respectively. Finally, the result is displayed on the screen.

AllDigitsOdd.java

import java.util.Scanner;

import java.lang.Math;

public class AllDigitsOdd {

 public static void main(String args[]) {

   // print main menu for user selection

   System.out.println("Please enter a number");

   Scanner scan = new Scanner(System.in);

   int selection = scan.nextInt();

   if (allDigitsOdd(selection)) {

     System.out.println("All numbers are odd");

   } else {

     System.out.println("All numbers are not odd");

   }

 }

 public static boolean allDigitsOdd(int number) {

   int digits = (int)(Math.log10(number) + 1);

   int even = 0;

   int odd = 0;

   for (int index = 1; index <= digits; index++) {

       if ((int)(number / Math.pow(10, index - 1)) % 10 % 2 == 0) {

         even += 1;

       } else {

         odd += 1;

       }

   }

   if (even == 0 && odd > 0) {

     return true;

   } else {

     return false;

     //if (odd > 0 && even == 0) {

     //  return true;

     //}

   }

 }

}

8 0
3 years ago
Other questions:
  • To move a file, you use the ____ command along with the source file name and destination name
    5·1 answer
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • Which of the following savings vehicles usually requires a high minimum balance? ASimple savings account BCertificate of Deposit
    7·1 answer
  • Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
    6·1 answer
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.
    13·1 answer
  • The block of code below is supposed to display “multiple of 5” if the positive number value is in fact a multiple of 5
    8·1 answer
  • Why would someone make a histogram instead of a bar chart?
    14·1 answer
  • Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
    12·1 answer
  • Where are my files shortcut in documents folder.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!