1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
10

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks

B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network
Computers and Technology
1 answer:
Alla [95]3 years ago
3 0

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

You might be interested in
PYTHON
Korvikt [17]

Answer:

import random

print("Hello! I have a random number from 1 to 100! It is your job to try and guess it!")

number = random.randint(1,101)

guess = int(input("start to guess: "))

num_guesses = 1

while guess != number:

   if guess > number:

       print("lower")

       guess = int(input("try again: "))

       num_guesses +=1

   elif guess < number:

       print ("higher")

       guess = int(input("start to guess: "))

       num_guesses +=1

print("congrats it took you", num_guesses, "tries")

Explanation:

6 0
3 years ago
Pick the correct statements regarding cell references.
shusha [124]

Statement two and three is correct.

Statement 1 is incorrect. A relative reference changes when a formula is copied to another cell while Absolute references remain constant. However, it is safe to say that an absolute address can be preceded by a $ sign before both the row and the column values. It is designated by the addition of a dollar sign either before the column reference, the row reference, or both. Statement C is also correct. A mixed reference is a combination of relative and absolute reference and the formula (= A1 + $B$2) is an example of a mixed cell reference.

7 0
4 years ago
Read 2 more answers
A web based application that integrates html code with business logic is said to be in violation of what design principle?
adoni [48]

A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

<h3>What is Html?</h3>

The Hypertext Markup Language or HTML stands for the standard markup language for documents developed to be displayed in a web browser. It can be administered by technologies such as Cascading Style Sheets and scripting languages such as JavaScript. HTML (Hypertext Markup Language) exists as the code that is used to structure a web page and its content. For example, content could be structured within a group of paragraphs, a list of bulleted points, or using photos and data tables

The protected variations pattern protects components from the variations on other elements (objects, systems, subsystems) by wrapping the direction of instability with an interface and operating polymorphism to make various implementations of this interface.

Hence, A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

To learn more about Hypertext Markup Language refer to:

brainly.com/question/5560016

#SPJ4

5 0
2 years ago
Most of the international operations in a computer use hexadecimal numbering. True Or False
Natalija [7]

Answer:

True

Explanation:

The hexadecimal numbering is the most used numeric system for international operations in a computer, in our daily life we use the decimal system but for the CPU use the byte or octet as a basic unit of memory, we need more than 10 digits, and the hexadecimal system has 16, in addition, the binary system is hard to understand.

8 0
4 years ago
A(n) _____ is any hardware component that allows you to enter data and instructions into a computer or mobile device.
Darya [45]
Hello there.

<span>A(n) _____ is any hardware component that allows you to enter data and instructions into a computer or mobile device.

</span><span>Input Device</span>
4 0
4 years ago
Other questions:
  • The animation industry is solely reliant on 3-D modeling and 3-D virtualization to create the animated movies in the cinemas.
    9·2 answers
  • E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
    13·1 answer
  • When encountering another vessel in darkness or reduced visibility, what do visible red and green lights indicate
    9·1 answer
  • What is a collection?
    5·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
    6·1 answer
  • Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
    5·1 answer
  • For this project, you have to write 3 functions. C++
    13·1 answer
  • In my mouth In my hair..........​
    15·2 answers
  • Will give BRAINLIEST, PLEASE HELP, WILL BE MUCH APPRECIATED
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!