1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
7

What application or interface allows you to configure security filtering?

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
6 0
<span>Group Policy Management console.</span>
You might be interested in
To view the preview pane, click the ____ tab, and click print on the navigation bar
Blababa [14]

To view the preview pane, click the "File" tab, and click print on the navigation bar.

I guess the word in the blank is File.

3 0
3 years ago
The same student is curious about how a Web site appears on his computer screen. On a separate piece of paper, draw and explain
Ksivusya [100]

Answer:

HTTP is the application layer protocol required.

Explanation:

For a web page to be displayed on a browser, the seven layers of the OSI model work together. On the application layer, HTTP protocol is used to communicate between the server and the client. The HTTP client is the browser (Chrome, Internet Explorer, Firefox etc.) which sends a request to the HTTP server for accessing a web page.  

When a URL is accessed, the HTTP client sends a request to the HTTP server. The server locates the file which is being requested and sends a response message containing the web page which is to be displayed. The exchange of data between the HTTP client and server takes place over a TCP connection.

TCP is a transport layer protocol which provides a reliable connection over which the exchange of data takes place. Data at the transport layer is sent in the form of segments. If the data being sent from the server is too long, it is divided into multiple segments and sent one after the other. The client is then responsible for joining the segments and displaying the information as a web page. The transport layer is also responsible for error correction and detection during the communication process.

If the student is sending or retrieving information from a secure website, the messages being exchanged between the client and server will be encrypted. This means that if a third-party tries to tap the communication process, they would not be able to decipher the messages. This increases the security and helps keep the information present on the web page confidential.

8 0
4 years ago
What is the procees called when deleting a hard drive securelly
zlopas [31]
The process of securely erasing a hard drive is called wiping :)
8 0
4 years ago
You manage Windows notebook systems that are members of a domain. You have ten regional salespeople who travel extensively and u
Tcecarenko [31]

Answer:

To provide the needed access to these shared files, you need to set up offline files for the folder that contains these files as this will also solve the problem of the users getting to use out-of-date documents since the user can get access to the files even when disconnected from the network.

Explanation:

Offline Files make network files available to users by ensuring local copies of network shares are stored, making it possible to work with files while away from the network. Offline files can be easily synced with network files.

3 0
3 years ago
1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
Lera25 [3.4K]

Answer:

GIRL

Explanation:

DALAGANG FILIPINA

14 YEARS OLD

NEED FRIENDS

6 0
2 years ago
Other questions:
  • Select the correct answer.
    5·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
    12·2 answers
  • A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
    9·1 answer
  • TolTel Inc., an information technology firm, has created a network that allows its employees to easily access, share, and publis
    11·1 answer
  • count multiples(num1, num2, AND) Description: Returns the number of multiples of N that exist between num1 and num2 inclusive. P
    12·1 answer
  • How is counting in this circle and square system similar to how we count in our regular lives? How is it different?
    15·1 answer
  • The practice of spamming has been growing because telephone solicitation is no longer legal. it is good advertising practice and
    14·1 answer
  • If you want smaller tables to fit on a single page?
    14·1 answer
  • (e) The vending machine stores the quantity of items available in a database table called ITEMS
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!