1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
6

CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi

guration settings either blocks it or allows it to pass through is called: a-Antivirus b-Firewall c-Antispyware d-Malware 2-A device designed to forward data packets between networks is called: Router 3-A computer network service that allows clients to make indirect network connections to other network services is called 4- Which of the following answers list the protocol and port number used by a spam filter
Computers and Technology
1 answer:
Nastasia [14]3 years ago
3 0

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
Computer works on the basis of?​
ASHA 777 [7]
Computer works on the Basis of multitasking.
6 0
2 years ago
What kind of output device would not be used to output images
saveliy_v [14]

Answer:

Speakers.

Explanation: Cause they only output sound, and are devices, further more they are not used to output images, like how could speakers output images using sound? They can't.

3 0
3 years ago
What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
Alchen [17]

Make sure that visitors receive relevant ads that pertain to their search query by segmenting your search engine marketing account into pertinent campaigns and ad groups.

<h3>What is search engine marketing? </h3>
  • A digital marketing tactic called search engine marketing (SEM) is used to make a website more visible in search engine results pages (SERPs).
  • The practice of promoting websites by making them more visible in search engine results pages, primarily through paid advertising, is known as search engine marketing.
  • The technique of obtaining traffic from search engines, either naturally or by paid advertising, is known as search engine marketing (also known as search marketing).
  • There are two basic sorts of search marketing: PSAs and SEOs (Search Engine Optimization) (Paid Search Advertising).

To learn more about search engine marketing, refer to:

brainly.com/question/20850124

#SPJ4

8 0
2 years ago
List out analog computer​
Fynjy0 [20]

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

5 0
3 years ago
in order for your photographs to be protected by copyright laws, you need to submit a written request​
andrew11 [14]

Answer:

The answer is "False".

Explanation:

The copyright law in the United States, namely the 1976 Copyright Law, was governed through the state constitution. The copyright constitution forbids an illegal copy of the work. Even so, it's also forbidden to obey the orders also-everyone can photocopy the ideas of work.

  • It doesn't cover single words, phrases, or slogans; common symbols.
  • It is typographical ornaments, logos, or coloring products or contents listings, that's why the given statement is false.
3 0
3 years ago
Other questions:
  • This assignment is to read from an input file and process the data for a group of people. Your program calculates the interest a
    5·1 answer
  • Different units of CPU ?
    12·1 answer
  • Why is it a good idea to view your HTML code in more than one web browser
    13·1 answer
  • Select the correct answer.
    12·2 answers
  • How do Web browsers interact with URL/URIs to navigate the internet
    14·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • If you see ________________________ in a cell, it means the column is not wide enough to display the cell content. Select one: a
    15·1 answer
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!