1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
5

Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan

t steps to take to keep firewalls effective?
Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
8 0

Answer and Explanation:

The requirements to be considered while determining the firewalls' features and locations are:

  • The reason so as to why to implement a firewall
  • Traffic inspection type required to be accomplished.
  • Best OS, i.e., Operating System suitable for the work need.
  • The method to fir firewall into the topology (network).
  • Making decision whether the firm is more suitable for software solution or application.

Some of the importants steps to be taken for the firewalls to remain effective:-

  • Use of strong password.
  • according to the usage, tweak the settings of the firewall.
  • Enable auto update for firewall.
  • Maintain consistency in settings throughout the network.
  • addition of multiple layers to the security and computer system.
  • Application of encryption (128 bit WEP).
  • Analysis of the traffic both outbound and inbound and taking appropriate measures.
  • Always check for leaks and ports.
You might be interested in
Remi always works on several projects at a time. He has thousands of files saved on his computer. Yet he always seems to be able
astraxan [27]

Answer

the micmethod <-----made by myself

Explanation:

1. alphabetical order

2.put in empty folder

3.name folder after file put file in hard drive

4.a hard drive is also a usb

5.make hard drive into necklace and wear all the time

6. now u never lose it

4 0
3 years ago
How can development in ICT be utilized to speed up the development and integration efforts
maw [93]

Answer:

Explanation:

1.  Sustainability and scale

2.  Lack of knowledge

 

3. Pace of change

4.  Funding

5. Changing roles and norms

7 0
4 years ago
Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMile
lina2011 [118]

Answer: 40, 4

Explanation:

8 0
3 years ago
An accountant initially records adjusting entries in a(n) _____.
Alexus [3.1K]
Journal!
Adjusting entries are changes to journal entries you've already recorded.
4 0
3 years ago
Given a variable s that is associated with the empty string, write some statements that use a while loop to associate s with a s
ArbitrLikvidat [17]

Answer:

Following are the program in the Python Programming Language.

#declare empty string variable

s=""

#declare variable that store "*" as string

x= "*"

#set the while loop

while(len(s) < 777):

   #initialize the value of 'x' in 's'

   s= x

   x += "*"

Explanation:

<u>Following are the description of the program</u>.

  • Set an empty variable to store the string type values.
  • Again, set a variable 'x' and initialize asterisks in it as a string.
  • Set the while loop that iterate, when the length of the variable 's' is less than 777, then initialize the value of the variable 'x' in the variable 's' and concatenate asterisks with the variable 's'.
8 0
3 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • What does the term World Wide Web refer to?
    5·2 answers
  • For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
    9·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • Which type of virus includes protective code that prevents outside examination of critical elements?
    14·1 answer
  • The 10 and 2 o'clock hand position on the steering wheel is no longer recommended because _____.
    13·1 answer
  • What is ransomware<br>я​
    5·1 answer
  • Do you think it’s better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
    14·1 answer
  • How many voltage values can be represented with a 10-bit binary code?
    15·1 answer
  • Which statement is true about encoding in Python?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!