1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
10

A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a

ctivities. The signature is applied across the corporate campus regardless of the type of web browser used. What type of triggering mechanism is being implemented?
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
6 0

Answer:

Policy based

Explanation:

Triggering mechanism is a vital tool in information technology automation. It is used to activate an action or event at the instant occurrence or triggered by another event.

There are various types of triggering mechanism used, they are dynamic, intensity-based, observer-based, policy-based triggering mechanism etc.

The policy-based triggering mechanism describes a triggering mechanism that defines a trigger based on standard policies or patterns, for an event or events to take place.

Sergio039 [100]3 years ago
3 0

Answer:

policy-based

Explanation:

The policy-based triggering mechanism is actually dependent on the operation that the intended user wants to achieve. It is configured by defining an already intended pattern, in this case, it is web surfing activities, and as earlier stated, it is configured according to what is intended, like the name suggests "policy-based".

You might be interested in
Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
levacccp [35]

Answer:

Check the output

Explanation:

# -*- coding: utf-8 -*-

"""

Created on Thu Apr 12 00:39:11 2018

author:

"""

stocks ={

       "tomato soup": 20,

       "cheese": 8,

       "bread": 6,

       "milk": 8,

       "butter": 7,

       "coffee": 8,

       "ice cream": 5,

       "orange juice": 12,

       "bacon": 6,

       "tortilla chips": 14,

       "ramen": 24 }

prices ={

       "tomato soup": 1.85,

       "cheese": 3.99,

       "bread": 2.50,

       "milk": 3.59,

       "butter": 1.99,

       "coffee": 5.99,

       "ice cream": 2.99,

       "orange juice": 2.50,

       "bacon": 5.49,

       "tortilla chips": 3.00,

       "ramen": 0.99 }

def grocery_cost(item_list,quantity_list):

   totalcost = 0

   for i in range(len(item_list)):

       totalcost=totalcost+(quantity_list[i]*prices[item_list[i]])

       

   return totalcost

def stock(item):

   print("Number of itmes present in the stock:",stocks[item])

print("Welcome to the on-line grocery store!!")

print("Items that are available for purchase:")

for key in stocks.keys():

   print(key)

#chosen foods

print("Enter the item with quantity or Enter 'Q' when you are done")

item_list=[]

quantity_list=[]

while True:

   item=input('Enter the item name: ')

   if item=='Q' or item=='q':

       break

   item_list.append(item)

   while True:

       quan=int(input('Enter the number of item: '))

       if stocks[item] >=quan:

           quantity_list.append(quan)

           break

       else:

           stock(item)

           print('Your requirement is higher than stock available. Please enter again!!')

print("\nTotal cost:", "$",grocery_cost(item_list,quantity_list))

Kindly check the output in the attached image below.

7 0
3 years ago
You write a short story, but you want to make sure your work is protected before you post it online. What should you do to help
Mars2501 [29]
Make sure you but no copyright, author, and date of publication, that may help.
8 0
3 years ago
What are the inputs that the model uses to make decisions?
hodyreva [135]

Answer:

It makes the decision better and adds ownership in the implementation

Explanation:

Hope this helps C:

~Chiena

8 0
2 years ago
__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
Delvig [45]
The answer is “a security event”
6 0
3 years ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action?
Wittaler [7]
It appears that they might be labeled "Hidden" in the properties of that file. Right Click on Properties and Uncheckmark Hidden<span />
7 0
3 years ago
Other questions:
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • How does an employer judge a candidate?<br> The employer judge's the candidate's ? for a job.
    12·1 answer
  • 1.Context clues can be used to determine the ________of an unfamiliar word
    5·2 answers
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Which of the following is true of operations within a spreadsheet program’s built-in functions?
    15·2 answers
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • Writers in our networked world enhance their credibility by
    5·1 answer
  • Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
    8·1 answer
  • Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
    11·1 answer
  • What technology would a bank's website use a scramble information as it is transmitted over the Internet
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!