1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
2 years ago
7

Connection security rules are used to secure traffic between two computers while it crosses internet?

Computers and Technology
1 answer:
Ludmilka [50]2 years ago
4 0

Answer:

:Connection security rules –less common rules that are used to secure the traffic between two specific computers while it crosses the network. This type of rule is used in very controlled environments with special security requirements.

You might be interested in
Combination of two or more networks
bezimeni [28]
The combination of two or more networks is internet work!!
Hope this helps
4 0
3 years ago
In comparing a computer to the human brain, the computer's hardware is like _____ and the computer's software is like _____.
Ne4ueva [31]
This includes application software<span> such </span>as<span> a word processor, which enables a user to perform a task, and system </span>software<span> such </span>as<span> an operating system, which enables other </span>software<span> to run properly, by interfacing with hardware and with other </span>software<span>.
</span>
Computer hardware<span> is the collection of physical parts of </span>a computer system<span>. This includes </span>the computer<span> case, monitor, keyboard, and mouse. It also includes all the parts inside </span>the computer<span> case, such </span>as<span> the hard disk drive, motherboard, video card, and many others. </span>Computer hardware<span> is what you can physically touch.


</span>
8 0
3 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Can somebody show me
OLEGan [10]
So you are gonna read that whole paragraph and then answer the question or describe what you learned about
7 0
3 years ago
______ is the software that blocks a user from being able to access your computer.
gavmur [86]
This would be your firewall

3 0
4 years ago
Read 2 more answers
Other questions:
  • Write a statement that reads 5 successive integers into these variables that have already been declared: x1, x2, x3, x4, x5. The
    11·1 answer
  • Which of the following is the correct order of the SDLC?
    14·1 answer
  • What kind of website uses keywords to locate content?
    15·1 answer
  • write a program that asks the user to enter a positive integer, then prints a list of all positive integers that divide that num
    6·1 answer
  • What is a stored​ procedure?
    8·1 answer
  • Explain why there is an overlap of skills and qualities in design professions​
    14·1 answer
  • Why is it important to record audio of silence in the area in which you are filming?
    12·2 answers
  • The Internet began when a large company wanted to sell products online. <br> True or flase?
    6·2 answers
  • Why is graphics important in multimedia application <br>​
    11·1 answer
  • What is required to publish documents on the Web
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!