1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
15

The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval

from a manager prior to implementing any new rules. While reviewing the firewall configuration you notice a recently implemented rule but can't locate manager approval for it. What would be a good step to have in the procedures for a situation like this
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
4 0

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

You might be interested in
The most widely used computer device​
irinina [24]

Answer:

I think a phone...........

5 0
3 years ago
Read 2 more answers
The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
sergey [27]

Answer:

5 MB.

Explanation:

1 foot = 12 inches

2400/9=266.66 feet per track

1 track excluding, remaining 8 track =2400 - 266.66 = 2133.33 feet

so, space available to store data = 2133.33 feet

now, 2133.33 feet = 25600 inches

total data that can be stored = 25600 * 1600 = 40960000 bits

= 46080000/8 = 5120000 Bytes

= 5120000/1000000 = 5.12 MB = 5 MB (approx.)

3 0
3 years ago
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
9966 [12]

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

7 0
3 years ago
HELP ASAP
Nutka1998 [239]

Storyboarding is helpful during the planning stage of web design.

Explanation:

Organizing your thoughts can be a struggle. In other words, keeping characters, footages, and concepts coherent and apprehensive is a hassle. Visual representation of these concepts can help you stay structured and storyboarding is the best way visual organizer.

Story boards serve as the suitable blend of visuals and text. As far as script writing, novels, and creating other comprehensive plots, storyboards are perfect for sorting information.

4 0
3 years ago
Read 2 more answers
To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. TRUE
Elis [28]
I believe the statement is true. <span>To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. Hope this answers the question. Have a nice day. Feel free to ask more questions.</span>
6 0
3 years ago
Other questions:
  • Jawana has been working on a paper for her Anatomy class for weeks. One day her little brother was on her computer and accidenta
    14·1 answer
  • TCP is the protocol responsible for the delivery of data on the Internet, and IP provides addresses and routing information.
    12·1 answer
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; voi
    6·1 answer
  • WAP to find area of circle​
    12·1 answer
  • Answer if you know Javascript, html, css, python, and Ruby.
    12·1 answer
  • Being a part of an organization or giving back to the community is which rewards of work factor?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!