1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
10

ILL GIVE BRAINLIEST HELLP.

Computers and Technology
1 answer:
Semenov [28]3 years ago
8 0

Answer:

Device Manager

Explanation:

The Device Manager is used to check for hardware that have been installed on your system such as RAM, CPU, GPU etc. However, it has the option to update drivers for any hardware that you such desire.

You might be interested in
In client server network, there is no central server //// true or false​
Shkiper50 [21]

Answer:

Explanation:

False there is ALWAYS  a central server!

plz mark me brainliest

5 0
3 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
cestrela7 [59]

Answer:

A. Helps prevent a system from being fingerprinted by port scans.

B. Can restrict a computer from receiving network traffic.

D. Stop a process or application from launching.

Explanation:

The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.

Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.

Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.

It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.

7 0
3 years ago
if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
galina1969 [7]

The NMap procedure that can be used to help you to gain information about remote *nix hosts is Script Scanning

<h3>What is script scanning?</h3>

The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Therefore, The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Learn more about Script Scanning from

brainly.com/question/18152781

#SPJ11

4 0
2 years ago
How do u answer questions on brainly if ur on the app and on a phone. For me there is no answer button :(
Rudik [331]

Answer:

oh for me there is maybe try reloading?

Explanation:

8 0
3 years ago
List the names of 3 computer scientists
ikadub [295]

Hi there! Hopefully this helps!

------------------------------------------------------------------------------------------------------

1. Barbara Liskov.

2. Carl Sassenrath.

3. Larry Page.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • A ________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the custom
    11·1 answer
  • What should you do to protect your copyright
    7·1 answer
  • Which statement describing an operating system's Search feature is true?
    5·1 answer
  • E. what component must be compatible with every other component of the computer?
    15·1 answer
  • What is the best description of a raster image?
    10·1 answer
  • What do you think color theory<br> in web design is?
    14·1 answer
  • Components of document merging?
    5·1 answer
  • 6.1.5: Function definition: Volume of a pyramid.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!