1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
10

A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a

ctivities. The signature is applied across the corporate campus regardless of the type of web browser used. What type of triggering mechanism is being implemented?
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
6 0

Answer:

Policy based

Explanation:

Triggering mechanism is a vital tool in information technology automation. It is used to activate an action or event at the instant occurrence or triggered by another event.

There are various types of triggering mechanism used, they are dynamic, intensity-based, observer-based, policy-based triggering mechanism etc.

The policy-based triggering mechanism describes a triggering mechanism that defines a trigger based on standard policies or patterns, for an event or events to take place.

Sergio039 [100]3 years ago
3 0

Answer:

policy-based

Explanation:

The policy-based triggering mechanism is actually dependent on the operation that the intended user wants to achieve. It is configured by defining an already intended pattern, in this case, it is web surfing activities, and as earlier stated, it is configured according to what is intended, like the name suggests "policy-based".

You might be interested in
Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
olchik [2.2K]
The Answer is color:blue for changing an element's font color to blue
8 0
3 years ago
Read 2 more answers
What can be designed to create annoying glitches or destroy data
Katen [24]

I guess the best answer is Virus.

Virus is a malicious computer program that is designed to create annoying glitches or destroy data.

3 0
3 years ago
Read 2 more answers
A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
aleksandr82 [10.1K]

Answer:

Check the explanation

Explanation:

CODE:-

import java.util.ArrayList;

class Student

{

  private String name;

  private int grade;

  private static ArrayList<Student> classList = new ArrayList<Student>();

 

  public Student(String name, int grade)

  {

      this.name = name;

      this.grade = grade;

      classList.add(this);

  }

 

  public String getName()

  {

      return this.name;

  }

 

  /*Don't change the code in this method!

  This method will print out all the Student names in the classList Array

  */

  public static String printClassList()

  {

      String names = "";

      for(Student name: classList)

      {

          names+= name.getName() + "\n";

      }

      return "Student Class List:\n" + names;

  }

}

public class ClassListTester

{

  public static void main(String[] args)

  {

      //You don't need to change anything here, but feel free to add more Students!

      Student alan = new Student("Alan", 11);

      Student kevin = new Student("Kevin", 10);

      Student annie = new Student("Annie", 12);

      Student smith = new Student("Smith", 11);

      Student kane = new Student("Kane", 10);

      Student virat = new Student("Virat", 12);

      Student abd = new Student("ABD", 12);

      Student root = new Student("Root", 12);

      System.out.println(Student.printClassList());

  }

}

Kindly check the attached image below.

4 0
3 years ago
How has information technology made piracy possible
ololo11 [35]
Well, more and more people are buying products and then uploading them online so that other people, who may not have the money or just don't want to buy them can download them for free. Of course, this is illegal, however it is a common practice all over the globe. Even if you are not downloading, but rather just watching a show on a website where you don't have to pay for it - it is still piracy.
3 0
3 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
Other questions:
  • Which protocol is often used to publish web pages to a web server?
    5·1 answer
  • Java
    14·1 answer
  • Which key you should you press to leave the cell as it orginally was
    14·2 answers
  • Tree diagrams are useful for
    12·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • What are registers in ICT used for?
    5·1 answer
  • Please help it’s timed
    5·1 answer
  • Responsible use of computer is known as ................. .​
    11·1 answer
  • An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f
    14·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!