1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
8

Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with

advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.
a. server-to-server
b. outbound
c. authentication exemption
d. isolation
e. inbound
Computers and Technology
1 answer:
lubasha [3.4K]3 years ago
7 0

There are a lot of rules in computing. The above can be done with authentication exemption.

<h3>What is Authentication exemptions?</h3>

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

brainly.com/question/25739714

You might be interested in
Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
deff fn [24]

Answer:

a.  Maximum size of file = 8.003 GB

Explanation:

<u>a. Maximum size of file</u>

= (6 * 2 KB) + (2048 * 2 KB) + (2048 * 2048 * 2 KB)

= 12kb + 4096 Kb +  8388608 kb

= 8392716 kb

8392716/1024 mb = 8196.01 MB

8196.01 /1024 GB= 8.003 GB

<u>b. According to above calculation</u>

For 8 GB 6 direct, 1 single and 1 double indirect block requires

so

for 32 GB

24 direct Block

4 single and 4 double indirect block requires

7 0
4 years ago
When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
Cloud [144]

All answers are correct.

Source and explanation: certificationanswers.com/en/category/hootsuite-platform/

8 0
3 years ago
Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
Hitman42 [59]
Samantha would have to use the ‘time-lapse’ technique to film the video in the most efficient way.
5 0
3 years ago
Read 2 more answers
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
Vkq-jnfi-uif se-x fun girls joi-n mee-t usin-g this cod_e​
liberstina [14]

Answer:

Why?

Explanation:

7 0
3 years ago
Other questions:
  • a supermarket having a sale on canned foods' the sale includes 12 cans of soup for 10.65 what is the unit price per can of soup
    6·2 answers
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • The ability to memorize well is an example of
    6·2 answers
  • How do ethics affect people?
    15·1 answer
  • Changes in computer technology have an effect on _____.
    13·1 answer
  • A modern version of the BIOS firmware is called?
    12·1 answer
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • Will give brainliest
    8·1 answer
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!