1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
10

A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a

ctivities. The signature is applied across the corporate campus regardless of the type of web browser used. What type of triggering mechanism is being implemented?
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
6 0

Answer:

Policy based

Explanation:

Triggering mechanism is a vital tool in information technology automation. It is used to activate an action or event at the instant occurrence or triggered by another event.

There are various types of triggering mechanism used, they are dynamic, intensity-based, observer-based, policy-based triggering mechanism etc.

The policy-based triggering mechanism describes a triggering mechanism that defines a trigger based on standard policies or patterns, for an event or events to take place.

Sergio039 [100]3 years ago
3 0

Answer:

policy-based

Explanation:

The policy-based triggering mechanism is actually dependent on the operation that the intended user wants to achieve. It is configured by defining an already intended pattern, in this case, it is web surfing activities, and as earlier stated, it is configured according to what is intended, like the name suggests "policy-based".

You might be interested in
A form of brainstorming that serves as a visual aid to thinking laterally, helps explore a problem (usually by stating the probl
ELEN [110]

Answer:

The answer is BRAINSTORMING

Explanation:

<em>A visual aid to thinking laterally and exploring a problem, usually by stating the problem in the center  of the page and radiating outward spokes for components of the problem. Each component can then be considered separately with its own spokes, so that each point , thought, or comment is recorded.</em>

7 0
3 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
3 years ago
An e-commerce company is collaborating with artisans from all over the world to sell the artisans' products. Accenture is helpin
satela [25.4K]

Accenture is helping this client build a platform that will allow them to interact with the e-commerce company and get details of the buyer so they can target to a specific audience.

<h3>What is Blockchain Digital identity?</h3>

The term Digital identity is a tool that helps firm in terms of growth and viability of a lot of their digital economy, and it is needed by every organization.

Therefore, we can say that  Accenture is helping this client build a platform that will allow them to interact with the e-commerce company and get details of the buyer so they can target to a specific audience.

See options below

connect them with the customers, enhance their marketing, and build their client base

link them with the banks to prove credit-worthiness and inform them of loan options

individually recognize and reward them for using methods and materials that align with buyers' values such as sustainability and labor practices

allow them to interact with the e-commerce company and get details of the buyer target to a specific audience

I don't know this yet

Learn more about Accenture from

brainly.com/question/25682883

#SPJ1

5 0
2 years ago
____________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is o
Vitek1552 [10]

Answer:

Symmetric encryption or single key encryption

8 0
3 years ago
The ____________ is an efficient method to mount, power, and organize electrical motor control, automation, and power distributi
Lesechka [4]

Answer:

Motor Control Center

Explanation:

Such centers are built to control various or all (if possible) electric motors found in a central location. The Motor Control Center usually comprises of many section that are enclosed but having one central power bus, but each of the section would have its own combination starter. It is an efficient power distribution system also.

4 0
3 years ago
Other questions:
  • General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
    13·1 answer
  • What are a few benefits of virtualization?<br> How do they benefit ?
    9·1 answer
  • You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on
    8·1 answer
  • Compare and contrast inertial confinement with thermonuclear reactors.
    7·1 answer
  • "You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can b
    12·1 answer
  • Write down the difference between Application Software and
    15·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • A radio and communications security repairer is responsible for both radio and satellite communication systems.
    6·2 answers
  • In what year was the earliest documented use of the word computer?.
    9·1 answer
  • a printer's accessory list includes a maintenance kit with a variety of replaceable parts you should install after 100,000 pages
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!