1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
12

Martha is a network monitoring technician working on a firewall for her company’s network. To filter traffic going through the f

irewall, she should
A) select Firewall first and Rules after
B) select the Floating icon on the firewall first
C) select WAN first and set firewall rules after
D) select Protocol first and Firewall after
Computers and Technology
2 answers:
tia_tia [17]3 years ago
7 0

Answer:

D

Explanation:

Not much of a tech person, but protocol then firewall seems the most reasonable.

Bess [88]3 years ago
4 0

Answer:

yea you can give him brainlies now

Explanation:

You might be interested in
Briefly describe the software quality dilemma in your own words
Dahasolnce [82]

Answer:

 software quality dilemma is a situation where there is confusion regarding what should we prioritize : a good quality work or a fast paced work. In software development , many a times there will be deadlines to achieve, in such cases software quality dilemma is bound to occur. A developer would have to choose between writing and optimized and well commented code or just get the job done without proper optimized or reviews. In same lines, many companies have to decide between regular reviews and expert opinions of a product for good software quality or bypass them to meet budgets and deadlines.

6 0
4 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
ladessa [460]
The correct answer for the question that is being presented above is this one: "D. Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents a lightbulb." <span>Each of the symbols is labeled with a number. </span>
6 0
3 years ago
Plz help
vazorg [7]

The correct answer is:


a. All parts of the circuit will begin to carry higher amounts of current than normal.


Explanation:


When two or more than two conductors of different phases touch each other in a power line, the part of the impedance is shunted out of the circuit due to which a large current flow in the un-faulted phases, such current is called the short circuit current. Short circuit current decreases the impedance in the circuit while the current in the circuit increases.

8 0
3 years ago
Read 2 more answers
Changing how information is represented so that it can be read by a person is called
Usimov [2.4K]

Answer:

Decode. To change how information is represented so that it can be read by a person.

Explanation:

Decoding is the ability to apply your knowledge of letter-sound relationships, including knowledge of letter patterns, to correctly pronounce written words. Understanding these relationships gives children the ability to recognize familiar words quickly and to figure out words they haven't seen before.

4 0
3 years ago
Other questions:
  • What seems to be the prevailing opinion about enterprise clouds?
    8·2 answers
  • Why is time management considered a soft skill
    10·2 answers
  • A tripod head can move vertically or horizontally. What term describes these movements?
    15·2 answers
  • What is the definition of D1-D4?
    14·1 answer
  • What is an unknown network called
    6·1 answer
  • How many bit make a byte .​
    12·2 answers
  • What is the best yellow thing you can think of? (I need this for a presentation to turn it black and white.) Please no lemons.
    14·1 answer
  • Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and u
    9·1 answer
  • Please help!! i need this asap &lt;3 <br> (the boxes have the same answer choices in both)
    7·2 answers
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!