1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
4 years ago
15

Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th

rough the organizations network.which computer device or system should she use?
Computers and Technology
2 answers:
Vilka [71]4 years ago
8 0

Answer: The correct answer is a firewall.

Explanation: In order to protect the school’s network from hackers, worms and viruses, Jen needs to install a firewall. Firewalls are found in all business and school computer systems. In addition to protecting the network from the threats above, they can also filter websites. This allows access to only the websites that the administrator wants the students or employees to have access to.

ycow [4]4 years ago
6 0
NSA (network security appliance) also know as a firewall.

example:
https://www.sonicwall.com/en-us/products/firewalls/mid-range
You might be interested in
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
What arw two reasons for maintaning your privacy on the internet
Mekhanik [1.2K]

Answer:

so people can't get your information and use it to their advantage and because you never know what people could do with that information

Explanation:

8 0
4 years ago
Read 2 more answers
With a web app, much of the program code for the software runs locally on a computer, instead of running on a remote computer co
Eddi Din [679]

Answer:

B. False

Explanation:

7 0
4 years ago
Who would be a member of the American Dental Association?
ycow [4]

Answer:

a pratcing dentist

Explanation:

4 0
3 years ago
1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
Sav [38]

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

7 0
3 years ago
Other questions:
  • When a browser makes a request for a static web page, the web server a. finds the HTML for the page and renders it b. renders th
    11·1 answer
  • A name given to a spot in memory is called:
    5·1 answer
  • Together, what do the divisions of the DHSMV do?
    12·1 answer
  • How is a ink pen better than a digital pen.
    8·1 answer
  • Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address r
    9·1 answer
  • Nathan wants to create multiple worksheet containing common formatting styles for his team members. Which file extension helps h
    9·1 answer
  • True or false questions:
    11·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • Marie has never used a word processor. In 3 to 4 sentences, describe how she could benefit from using a word processor to comple
    7·2 answers
  • How can you reduce the Impact of Hacking? <br>pls help with this &lt;3​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!