1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
2 years ago
8

Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with

advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.
a. server-to-server
b. outbound
c. authentication exemption
d. isolation
e. inbound
Computers and Technology
1 answer:
lubasha [3.4K]2 years ago
7 0

There are a lot of rules in computing. The above can be done with authentication exemption.

<h3>What is Authentication exemptions?</h3>

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

brainly.com/question/25739714

You might be interested in
Remy’s manager has asked him to change the background color scheme from reds to blues in the standard template the company uses
Sergeu [11.5K]

Answer:

A on edg

Explanation:

I took the assigment

7 0
3 years ago
Read 2 more answers
A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
Arisa [49]
I think it is 25 im not sure though
3 0
3 years ago
Read 2 more answers
The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
kolbaska11 [484]

Answer:

Dynamic packet-filtering firewall.            

Explanation:

Packet filtering is basically a technique of scanning and filtering the network data packets. This technique allows or disallows the network packets to enter through the firewall or to transmit from one network to the other. Dynamic packet filtering packet-filtering firewall allows only a particular packet with a particular source, destination, and port address to enter through the firewall. It utilizes the information in packet header and inspects and utilizes active connections state information. This information enables to decide which packet should enter through the firewall.

8 0
3 years ago
What happens if a computer lags too much?
Makovka662 [10]

Answer:

it can overheat trying to process and from there multiple things may happen

1. the computer will recognise its overheating and automatically shutdown

2. the computer with catch on fire

3. the computer with crash the program and go back to the home screen

Explanation:

7 0
3 years ago
Read 2 more answers
Which staff member takes a set of plans and supervises their construction?
jekas [21]

Answer:

Technical director

Explanation:

Someone else's models and designs ,building, decoration, installation, service, hit, and processing supervises by the technical director.

6 0
3 years ago
Other questions:
  • Describe in 2–3 sentences how you would use the autosum shortcut.
    9·2 answers
  • What is a function library?
    11·1 answer
  • Productivity software has been used for a number of years. Recent advancements in productivity software technology have made ___
    14·1 answer
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible doma
    12·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • Python will ignore any line of code that begins with hashtag true or false​
    13·2 answers
  • Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "
    12·2 answers
  • In terms of computer hardware, where does the actual work of computing take place?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!