1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
15

The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval

from a manager prior to implementing any new rules. While reviewing the firewall configuration you notice a recently implemented rule but can't locate manager approval for it. What would be a good step to have in the procedures for a situation like this
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
4 0

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

You might be interested in
Lyla is using a computer repair simulator. This program can help her
tamaranim1 [39]

Answer:

D. Learn the different types of hardware.

Explanation:

When Lyla is a computer repair simulator, she is learning the different types of hardware. After she has learned most of the types of hardware, she can repair her computer.

hope this helped.

8 0
2 years ago
Read 2 more answers
PLS HELP ME I HAVE NO TIME
melisa1 [442]
Please Help! Unit 6: Lesson 1 - Coding Activity 2
Instructions: Hemachandra numbers (more commonly known as Fibonacci numbers) are found by starting with two numbers then finding the next number by adding the previous two numbers together. The most common starting numbers are 0 and 1 giving the numbers 0, 1, 1, 2, 3, 5...
The main method from this class contains code which is intended to fill an array of length 10 with these Hemachandra numbers, then print the value of the number in the array at the index entered by the user. For example if the user inputs 3 then the program should output 2, while if the user inputs 6 then the program should output 8. Debug this code so it works as intended.

The Code Given:

import java.util.Scanner;

public class U6_L1_Activity_Two{
public static void main(String[] args){
int[h] = new int[10];
0 = h[0];
1 = h[1];
h[2] = h[0] + h[1];
h[3] = h[1] + h[2];
h[4] = h[2] + h[3];
h[5] = h[3] + h[4];
h[6] = h[4] + h[5];
h[7] = h[5] + h[6];
h[8] = h[6] + h[7]
h[9] = h[7] + h[8];
h[10] = h[8] + h[9];
Scanner scan = new Scanner(System.in);
int i = scan.nextInt();
if (i >= 0 && i < 10)
System.out.println(h(i));
}
}
6 0
3 years ago
Find the true Value if: int x = 15; int y = 100;
ch4aika [34]

Answer:

! (x< 15)

(x<= 15)

(x != 5);

Explanation:

Here, x is not less than 15 and hence !(x<15) is true. Also x = 15 and hence x is !=5, and hence x<=15 amd x!= 15 is true. However, x !=y and hence x== y is false, and x <y and hence x>y is false. And x * -y = a negative number and hence < 0. And hence ( x * -y >0) is false. And hence, the above mentioned options holds a true value, and rest of the options holds the false value.

7 0
3 years ago
is/are valuable in areas such as monitoring environmental changes, monitoring traffic or military activity, protecting property,
likoan [24]

Answer:

Wireless Sensor Networks (WSN's)

Explanation:

Wireless Sensor Networks refers to a group of sensors  monitoring and recording the conditions of environment physically. Organizing the data efficiently.

In computer Science world wireless sensor are areas with numerous workshops for operating and managing machinery and vehicles.

Detecting biological system is to detect the slight moments of biological environments conditions .It is a prototype network for detecting a ground base nuclear devices , sensors and radio logical material.

Wireless sensor networks are used to monitor and managing the production both in chemical and filed.

3 0
3 years ago
What is binary in the computer ?
Elina [12.6K]

this is what  stores the data and calculations made so your history your gallery etc downloads games social media it stores it for u

5 0
3 years ago
Other questions:
  • Explain the term computer output​
    8·1 answer
  • What does limited access to a document mean?
    7·2 answers
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • Explain 3 ways you can be an upstander when seeing cyberbullying.
    13·2 answers
  • My computer screen keeps flashing black, it's on a very low brightness level and I very rarely put it up to high level unless I
    13·2 answers
  • Four categories of installer apps
    13·1 answer
  • What is data science?​
    15·1 answer
  • Can You do this to help me plz 50 points
    15·2 answers
  • Why is the central limit theorem so important to the study of sampling distributions?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!