1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
3 years ago
6

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and

time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?
a. Asset management
b. Baselines
c. Network maps
d. Change management
Computers and Technology
1 answer:
rjkz [21]3 years ago
5 0

Answer:

d. Change management

Explanation:

Change management can be defined as a strategic process which typically involves implementing changes (modifications) to an existing process or elements on a computer system.

In this scenario, an administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Thus, what best describes these actions is change management.

As a network administrator, you would be required to perform changes to your network and network devices in order to get an optimum level of performance.

You might be interested in
You are considering upgrading memory on a laptop. What are three attributes of currently installed memory that HWiNFO can give t
Dennis_Churaev [7]

Answer:

Some of the qualities of the installed memory which HWiNFO can reveal are:

  • Date of manufacture
  • Memory type
  • Speed of memory

Explanation:

HWiNFO is an open-source systems information app/tool which Windows users can utilize as they best wish. It helps to detect information about the make-up of computers especially hardware.

If you used HWiNFO to diagnose the memory, the following information will be called up:

  • the total size of the memory and its current performance settings
  • the size of each module, its manufacturer, and model
  • Date of manufacture
  • Memory type
  • Speed of memory
  • supported burst lengths and module timings,
  • write recovery time etc.

Cheers

6 0
3 years ago
Specialized vocabularyis known as:
svet-max [94.6K]

Answer:

<u>"Jargon"</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

<em>Specialized vocabulary</em> is sometimes also known as <u>"Jargon"</u> . These are sets of words that are used specifically and uniquely for specific sets of groups or organizations.

For example Lawyers Judges and other law enforcement officials have their own Specialized vocabulary that are better understood by other people in Law enforcement, people that are not part of Law Enforcement might have a hard time understanding.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
Which best explains why the world first civilizations developed in river valley's
fiasKO [112]
They need to be close to a body of water and being in a valley is good because they are protected because they have mountains around
4 0
2 years ago
A(n) _____ is used to create a new file or to overwrite an existing file by attaching it to a command that produces output.
Alex787 [66]

Answer: Redirection symbol

Explanation: Redirection symbol/operator is the special operator that is used in programs along with commands. The operators that are generally used are ">",">>","I" and "<". These commands are given in the section of the DOS commands and other command prompt sections. This is the process where the changes in input feed and output is  analyzed and read through these commands.

3 0
3 years ago
Protecting a sheet means ?
larisa86 [58]

To prevent other users from accidentally or deliberately changing, moving, or deleting data in a worksheet, you can lock the cells on your Excel worksheet and then protect the sheet with a password.

8 0
2 years ago
Other questions:
  • Select one technology limitation in regards to quality improvement (QI) programs Technology is not fast enough Not all electroni
    12·1 answer
  • A byte in memory is identified by a unique number called its
    8·1 answer
  • What is special about the f and j keys on a standard keyboard?
    15·2 answers
  • Template files can contain the following items: text, tables, images and lists.
    10·1 answer
  • True or false.the color attribute cannot recognized the hexadecimal code.
    7·2 answers
  • Which are factors that go into a project plan?
    8·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30
    5·1 answer
  • Which kind of image is indispensable and needs added text to go with ?
    12·1 answer
  • Which iteration must have an expression that has a true or false value?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!