1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
15

On the Next Generation firewall, what type of security profile detects infected files being transferred with the application?

Computers and Technology
1 answer:
laiz [17]3 years ago
6 0

Answer:

Anti-Virus.

Explanation:

Anti-virus is the type of security profile detecting infected files transmitted with the software.

It is a kind of program that designed and developed to guard computers against threats such as malware, program viruses, trojan, botnets, keylogging software, malicious software etc. The following apps work for scanning, detecting and removing threats out of your system.

You might be interested in
Eq-20 why is the height of a vhf radio antenna important
masya89 [10]
Reasons why the height of a VHF radio antenna is important is because VHF radios work by the line of sight principle.
Line of sight
its a line from observers eye to a distant point.its a line between two points specifically the straight path between a transmitting antenna (as for radio or television signals) and receiving antenna when unobstructed by the horizon.
7 0
3 years ago
Read 2 more answers
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
What is a database in access
aliya0001 [1]
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. ... It can also import or link directly to data stored in other applications and databases.
6 0
3 years ago
William would like to sort a list of items after the data is already entered.
kari74 [83]

Answer:

Database software

Explanation:

6 0
3 years ago
In some database programs, a data file is referred to as a(n) ______.
Illusion [34]

In some database programs, a data file referred to as a table option (a) is correct.

<h3>What is a database?</h3>

A database in computer is a structured data collection that is technologically accessible and stored.

The question is incomplete.

The complete question is:

In some database programs, a data file is referred to as a(n) ______.

a. table

b. unit

c. record

d. sheet

A data file is known as a table in some database applications.

A database system contains vital info about a business; when the data is processed, it becomes valuable knowledge about the business and aids in choice.

Thus, in some database programs, a data file referred to as a table option (a) is correct.

Learn more about the database here:

brainly.com/question/6447559

#SPJ4

8 0
1 year ago
Other questions:
  • Which of the following costs should be considered when providing your own Web server instead of using a cloud service provider o
    7·1 answer
  • The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but doe
    10·1 answer
  • What are the benefits of maintaining your vehicle?
    5·2 answers
  • Arrange the steps involved in natural language generation.
    9·1 answer
  • Write a program that plays the popular scissor-rockpaper game. (A scissor can cut a paper, a rock can knock a scissor, and a pap
    12·1 answer
  • Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
    9·1 answer
  • 1. why is manufacturing considered the biggest contributor to progress
    9·1 answer
  • Please help me with these two questions! 60 points!
    14·1 answer
  • 18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *
    5·1 answer
  • What version of java do i have installed.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!