1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
3 years ago
10

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update

, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?
Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing
Computers and Technology
1 answer:
uysha [10]3 years ago
8 0

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

You might be interested in
​Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine whic
Galina-37 [17]

Answer:

Data scientist

Explanation:

Data scientist are those who work in the field of data science, which involves the study of data, developing methods of recording, storing, and analyzing data to effectively extract useful information and in this case Harrison is studying the past five years sales record(data) so as to determine which low-selling products should be discontinued.

7 0
4 years ago
What feature of excel allows you to automatically calculate common formulas which select data
Masteriza [31]
See attached word doc Autosum
Download doc
6 0
4 years ago
Convert infix to postfix
kvv77 [185]

Answer:

static int checkSymbol(char ch)

{

switch (ch)

{

case '+':

case '-':

return 1;

case '*':

case '/':

return 2;

case '^':

return 3;

}

return -1;

}

static String convertInfixToPostfix(String expression)

{

String calculation = new String("");

Stack<Character> operands = new Stack<>();

Stack<Character> operators = new Stack<>();

 

for (int i = 0; i<expression.length(); ++i)

{

char c = expression.charAt(i);

if (Character.isLetterOrDigit(c))

operands.push(c);

else if (c == '(')

operators.push(c);

 

else if (c == ')')

{

while (!operators.isEmpty() && operators.peek() != '(')

operands.push(operators.pop());

 

if (!operators.isEmpty() && operators.peek() != '(')

return NULL;    

else

operators.pop();

}

else

{

while (!operators.isEmpty() && checkSymbol(c) <= checkSymbol(operators.peek()))

operands.push(operators.pop());

operators.push(c);

}

}

while (!operators.isEmpty())

operands.push(operators.pop());

while (!operands.isEmpty())

calculation+=operands.pop();

calculation=calculation.reverse();

return calculation;

}

Explanation:

  • Create the checkSymbol function to see what symbol is being passed to the stack.
  • Create the convertInfixToPostfix function that keeps track of the operands and the operators stack.
  • Use conditional statements to check whether the character being passed is a letter, digit, symbol or a bracket.
  • While the operators is  not empty, keep pushing the character to the operators stack.
  • At last reverse and return the calculation which has all the results.
4 0
3 years ago
Programmers employ the acronym ____ to mean that if your input is incorrect, your output is worthless.
Nataly [62]
The answer is GIGO or the garbage in, garbage out. It is an idea regular to software engineering and science: the nature of yield is dictated by the nature of the information. In this way, for instance, if a scientific condition is disgracefully expressed, the appropriate response is probably not going to be right. It has a tendency to be utilized when discussing information section and databases. Essentially it implies that in the event that you enter off base or wrong information then you have truly entered waste.
8 0
3 years ago
What is the best way to use copyrighted material?
Tcecarenko [31]

Answer:

Locate the author and request permission to use the material.

Explanation:

There are different types of copyright though, they may just point you at what type of copyright it has and you need to read it to figure out what you can/can't do with the material.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
    12·1 answer
  • Select the correct answer.
    8·1 answer
  • What is another way to use the Help feature in Access 2016?
    15·2 answers
  • Can you share a google Docx. with a person who has an Icloud Email?
    11·1 answer
  • What does Josh Silverman name as the most important aspect of managing finances?
    10·2 answers
  • One of the greatest benefits of dual enrollment courses is that students can receive:
    15·2 answers
  • Why is it best to run av scans when the computer isn���t being utilized?
    7·2 answers
  • Select the correct answer. Adrian sent his manager Stacy an email message that required her immediate attention. Stacy was unabl
    7·2 answers
  • ....................
    5·1 answer
  • Is there actually a difference between left and right twix
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!