1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
8

Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with

advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.
a. server-to-server
b. outbound
c. authentication exemption
d. isolation
e. inbound
Computers and Technology
1 answer:
lubasha [3.4K]3 years ago
7 0

There are a lot of rules in computing. The above can be done with authentication exemption.

<h3>What is Authentication exemptions?</h3>

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

brainly.com/question/25739714

You might be interested in
Of the three different types of résumé formats (chronological, functional, or combination), which format would you use to create
Varvara68 [4.7K]

Of the three types of resume formats (chronological, functional, or combination), I would select the combination format.

Explanation

Choosing the type of Resume depends on what you want your employer to see and the circumstances you are currently in. Some would prefer the chronological Resume because it the most popular Resume used. However, choosing a chronological resume while you are in the process of switching careers or have recently joined the job market is not a good idea. It is specifically meant for those people who have experience. Functional Resume, on the other hand, works well in situations where people have gaps in their work history or looking to switch from one career to the another one.

Combination Resume, in my opinion, stands out as the most preferred Resume to use. It is a combination of chronological and Functional Resumes. A combination Resume;

  • Helps you highlight both your transferable skills and work history
  • It can be used by older workers, those in internship programs, people seeking to switch careers, and experienced workers.
  • It helps showcase your skillset and helps highlight “why you think you are the best fit for the role” question.

Learn more about interview process and Resume structure

brainly.com/question/9018115

#LearnwithBrainly

3 0
3 years ago
Read 2 more answers
How do you destroy data on hard drive?
Nataly_w [17]
You have to destroy the hard drive as it is like a memory for the computer so it can never be deleted
7 0
3 years ago
Read 2 more answers
The main activity area or the brain of the computer is called the ________
Darya [45]

Motherboard

Its a computer chip



6 0
3 years ago
Can a 3048 hp motherboard support a i7 10700k cpu?
KonstantinChe [14]

Answer:

Yes

Explanation:

6 0
3 years ago
Read 2 more answers
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
3 years ago
Other questions:
  • What connects two or more LANs together?
    10·2 answers
  • How many buttons does a gamecube controller have?
    7·1 answer
  • We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries.
    13·1 answer
  • End user needs assessment is a formal procedure to analyze a user's computer needs; it involves a specific set of steps that are
    8·1 answer
  • Analyze the following code. Which of the following statements is correct?
    9·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    11·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • The average numbers of shares a piece of content receives is known as its:
    7·1 answer
  • QUESTION 5
    9·1 answer
  • In large organizations, database design and management is handled by a database _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!