1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
5

Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan

t steps to take to keep firewalls effective?
Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
8 0

Answer and Explanation:

The requirements to be considered while determining the firewalls' features and locations are:

  • The reason so as to why to implement a firewall
  • Traffic inspection type required to be accomplished.
  • Best OS, i.e., Operating System suitable for the work need.
  • The method to fir firewall into the topology (network).
  • Making decision whether the firm is more suitable for software solution or application.

Some of the importants steps to be taken for the firewalls to remain effective:-

  • Use of strong password.
  • according to the usage, tweak the settings of the firewall.
  • Enable auto update for firewall.
  • Maintain consistency in settings throughout the network.
  • addition of multiple layers to the security and computer system.
  • Application of encryption (128 bit WEP).
  • Analysis of the traffic both outbound and inbound and taking appropriate measures.
  • Always check for leaks and ports.
You might be interested in
Why are pirated software considered a threat?​
densk [106]

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

<h3>What are the disadvantages of using pirated software?</h3>

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

brainly.com/question/3615098

#SPJ1

6 0
2 years ago
Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
Alex Ar [27]

yes, the employer DID misuse a disciplinary program against Ricardo for reporting an injury, because it was not an injury at that time, Ricardo reported the injury when it became an injury. he did nothing wrong. if he was in not in pain, he sustained on injury. until the injury devoloped from twisting his ankle.


hope this helps!

3 0
3 years ago
A word or line of a paragraph at the top of a page hanging indent is called ______
Iteru [2.4K]

Answer:

The answer is: second line indent

Explanation:

Also known as a second line indent, sets off the first line of a paragraph by positioning it at the margin, and then indenting each subsequent line of the paragraph.

8 0
3 years ago
RAM IS often referred
miss Akunina [59]
3

thank me later :))))))))
7 0
3 years ago
A(n) _________ is a lan that uses the same technologies as the internet but is provided to invited users outside the organizatio
In-s [12.5K]

Solution:

A(n) extranet  is a lan that uses the same technologies as the internet but is provided to invited users outside the organization who access it over the internet.

An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers.

This is the right answer.

3 0
3 years ago
Other questions:
  • Which of these is a typographical clue?
    9·2 answers
  • You can apply bold, italic, and underline styles to text. But why is it a good idea to use underline sparingly?
    13·2 answers
  • What is the key benefit of using RAM in a computer?
    12·1 answer
  • You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure
    8·1 answer
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • - Which amongst the following is not a Characteristic of Cloud Computing?
    5·1 answer
  • Question #7
    10·2 answers
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
  • Who is your favorite person from squid game?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!