1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
4 years ago
9

Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following

precautions: All the computers are patched, have antivirus software, and have unneeded services shut down. The network has a firewall with proxy server and IDS. The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days. Has Juan done enough to secure the network
Computers and Technology
1 answer:
Lesechka [4]4 years ago
4 0

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.

You might be interested in
Type the correct answer in the box. Spell all words correctly.
Kamila [148]

Answer:emphasis

Explanation:

7 0
3 years ago
I need someone's opinion<br> Which format is better? The first or second one? I can't decide 0.0
Ne4ueva [31]

Answer:

2nd one

Explanation:

4 0
3 years ago
Read 2 more answers
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
sladkih [1.3K]
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assistant.
TEMPLATES
5 0
3 years ago
Read 2 more answers
Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a pr
klio [65]

Answer:

See the code snippet below

Explanation:

import java.util.Scanner;

public class LabProgram{

     public static void main(String[] args){

          Scanner scan = new Scanner(System.in);

          System.out.println("Please enter first number: ");

          int firstNumber = scan.nextInt();

          System.out.println("Please enter second number: ");

          int secondNumber = scan.nextInt();

          maxMagnitude(firstNumber, secondNumber);

}

     public static int maxMagnitude(int firstValue, secondValue){

         System.out.println(Math.max(firstValue, secondValue));

}

}

6 0
3 years ago
Which pdu is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model?.
yulyashka [42]

The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment.

<h3>What is this PDU about?</h3>

Note that in the transport layer, a host computer is said to often de-encapsulate  what we call a segment so that they can be able to put back data to an acceptable or given format through the use of the application layer protocol that belongs to the TCP/IP model.

Therefore, The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment as it is the right thing to do.

Learn more about host computer from

brainly.com/question/553980

5 0
2 years ago
Other questions:
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • How many bits are required to store the text of the number "97" in ASCII?'
    5·2 answers
  • Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Mak
    8·1 answer
  • Hello im looking for someone to answer my question. Its about a coding project called "Quiz Master". Im having trouble with the
    7·1 answer
  • Joshua always participate in team meetings and comes up with ideas and suggestions. what quality is he demonstrating?
    7·1 answer
  • 6. By default,how the table headings are placed. (2 Points)
    6·1 answer
  • What are programs that are installed without the user knowing
    7·1 answer
  • Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 2 ms, Job B = 12
    7·1 answer
  • Help me pleaseeee!!!!!
    6·2 answers
  • What are the different types of topology?​ in details
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!