1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
5

When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) addr

ess outside the network in a foreign country. Why might this be worth investigating more closely
Computers and Technology
1 answer:
mario62 [17]3 years ago
7 0

Answer:

"It might demonstrate a malware infection" is the correct response.

Explanation:

  • Because once glancing at aggregate data log files, clients could perhaps actually listen to road conditions but instead correlation coefficient.  
  • For obvious reasons, whenever you see a significant portion of presenters designed to connect to something like a particular destination out beyond your channel, it might have been worthwhile to investigate quite tightly, although it might demonstrate malware.
You might be interested in
ANSWER ASAP GIVING BRAINIEST FIVE STAR AND HEART!
scoundrel [369]

A formula is statement written by the user to be calculated. Formulas can be as simple or as complex as the user wants. A formula can contain values, references to cells, defined names, and functions.

All formulas must start with the equals sign. =1+2+3

A function is a piece of code designed to calculate specific values and are used inside formulas. Functions to sum values, calculate a trigonometric cosine, and to calculate the current time are built into excel. Additional functions can be defined using Visual Basic.

Functions are typed alongside parenthesizes, where in the arguments if any are listed in between. To use functions in a formula, for example

=COS(3.14) will return the calculated cosine. =NOW() returns the current time. =SUM(1+2+3) *2 will multiply the sum by 2Explanation hope it helps

8 0
3 years ago
Read 2 more answers
Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
inna [77]

Answer:

The answer to the following question is "inspecting packets in isolation from their context".

Explanation:

Static Packet Filtering a technique for implementing security of the firewalls. In this process, it checks each packet against a group of commands if commands allow the type of packet then it is passed otherwise, it is dropped. It controls access to a network by analyzing the sending and receiving packets based on the IP addresses of the source and destination.

7 0
3 years ago
Step of opening browser on computer​
Katena32 [7]

Regardless of which version of Windows you have, you can also open the browser from the start menu. Select the start button and type in Chrome. If the Chrome browser is on your computer, it will be displayed in the menu, where you can now see the icon and select it to open.

                                   <3

3 0
2 years ago
After a programmer plans the logic of a program, the next step is to __________
Snezhnost [94]

Following the <u>planning of a program's logic by a programmer</u>, the program is coded. <u>Programming enables users to create computer code, apps, and websites</u>. Programming is defined as the <u>process of writing instructions</u> for computers using computer languages.

  • Computer code is used to code the websites, apps, and other technologies with which we interact daily.
  • Many of the finest tech jobs necessitate the ability to code.

Therefore, the final answer is "Coding the Program ".

Learn more:

brainly.com/question/735555

5 0
2 years ago
Where can the slide layout be changed
NeTakaya
To change<span> an existing </span>layout<span>, do one or more of the following: To add a placeholder, on the </span>Slide<span> Master tab, click Insert Placeholder, and then select a placeholder type from the list. Click a location on the </span>layout<span>, and then drag to draw the placeholder. Resize, reposition, or delete a placeholder.</span>
4 1
3 years ago
Read 2 more answers
Other questions:
  • Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
    10·1 answer
  • If you think a query is misspelled, which of the following should you do?
    15·1 answer
  • You can create a database using one of the many templates available or by creating a new ______ database.
    9·1 answer
  • Select a cybersecurity career that interests you. Describe the job duties and identify the skills required to excel in that care
    15·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Good keyboarding technique includes ________
    7·2 answers
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • How is it possible for the router to know whether it is supposed to send a cat photo to your laptop
    5·1 answer
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
  • You want to set the sticky bit on an existing directory, subdir, without otherwise altering its permissions. to do so, you shoul
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!