1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
6

CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi

guration settings either blocks it or allows it to pass through is called: a-Antivirus b-Firewall c-Antispyware d-Malware 2-A device designed to forward data packets between networks is called: Router 3-A computer network service that allows clients to make indirect network connections to other network services is called 4- Which of the following answers list the protocol and port number used by a spam filter
Computers and Technology
1 answer:
Nastasia [14]3 years ago
3 0

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds. Your progra
mart [117]

Answer:

// here is code in c++.

// include headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

long long int inp_sec,days,hours,minutes,sec;

long long int s;

cout<<"please enter the seconds:";

 // read the input seconds

cin>>inp_sec;

 // make copy of input second

s=inp_sec;

 // compute days,86400 seconds in a day

days=inp_sec/86400;

 // update the seconds after counting days

inp_sec=inp_sec%86400;

 // compute hours, 3600 seconds in an hour

hours=inp_sec/3600;

 // update the seconds after counting hours

inp_sec=inp_sec%3600;

 //compute minutes, 60 seconds in a minute

minutes=inp_sec/60;

 // compute remaining seconds

sec=inp_sec%60;

 // print the output

cout<<s<<" seconds is equal to "<<days<<" days "<<hours<<" hours "<<minutes<<" minutes "<<sec<<" seconds "<<endl;

return 0;

}

Explanation:

Declare variables "inp_sec","days","hours","minutes" and "sec" of long long int type. read the seconds from user and assign it to variable "inp_sec".Make a copy of input  seconds.Then compute the days by dividing inp_sec with 86400 and update the inp_sec. then find hours by dividing inp_sec with 3600 and update the inp_sec.Similarly  find the minutes and remaining seconds.After this print the output.

Output:

please enter the seconds:83647362                                                                                                                            

83647362 seconds is equal to 968 days 3 hours 22 minutes 42 seconds

3 0
4 years ago
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of
svetoff [14.1K]

Answer:

Archiving data files manages the size of a mailbox for  

✔ local

storage.

Creating an Outlook data file  

✔ protects

data files in storage on a computer.

Explanation:

Because its right.

3 0
3 years ago
Read 2 more answers
I need help here thanks forever who helps
lubasha [3.4K]

Answer:

the horse, the man, and the cactus

Explanation:

The horse is running

The man got slung off the horse, so its in motion

The cactus is flying everywhere from the horse.

3 0
2 years ago
Which phrase refers to the collection of geospatial data through the use of satellite images/pictures?
love history [14]

Answer:

The appropriate answer will be "Using remote sensing".

Explanation:

<u>Such basic applications of Earth's remote sensing images usually involve: </u>

  • Heavily forested fires could be viewed out of space, enabling the wanderers to have a much wider area than those of the field.
  • Trying to track particles to accurately forecast the weather either watch volcanic eruptions, including helping out for outbreaks of dust.

So that the above is the correct solution.

5 0
3 years ago
How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
Usimov [2.4K]
Answer: 14 channels are available in the unlicensed 2.4 GHz ISM band.
3 0
3 years ago
Other questions:
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • Define an organizational unit in your own words.
    11·1 answer
  • CHEMISTRY. metal+water》base+...............​
    12·1 answer
  • When reading words with a scanner object, a word is defined as ____?
    15·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • Why is this cite so rigged
    10·1 answer
  • BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
    12·1 answer
  • What is used for risk response control?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!