You can add exceptions to your firewall rules so that anybody who uses your home computer can visit any web site except a chosen few web sites. True or false?

Answers

Answer 1

The answer would be true. Firewall rules define what kind of Internet traffic is allowed or blocked. ... A firewall rule consists of firewall services , which specify the type of traffic and the ports that this type of traffic uses. For example, a rule called Web browsing has a service called HTTP, which uses the TCP and port number 80.


Related Questions

in python Write a loop that counts the number of lowercase characters that appear in the string referenced by mystring.

Answers

Answer:

mystring = "My name is David Acheme"

count = 0

for i in mystring:

    if(i.islower()):

        count=count+1

print("The number of lowercase characters in: "+mystring)

print(count)

Explanation:

1. We declare a String Variable and assign a value.

2. Intialize a count variable to zero.

3. Using a for loop is to loop through each characters in the string.

4. The if condition checks when a lower case character is encountered using the islower method and increases count by 1

5. Prints the value of count.

Jay is a security administrator for a large company and has about 100 hosts on his network that were recently attacked by a virus. He’s concerned because there was a patch available that would have minimized the impact from the virus. What is the best solution to implement on the network?

Answers

Answer:

Jay should install patch management software and tools.

Explanation:

Patch management can manage this network of hosts as it will persistently deploy all the missing patches to keep these computers up to date.  Patch management software helps to test and install multiple patches on existing applications on a computer. This allows systems in a network to stay up to date on existing patches and decide which patches are the appropriate ones. So this is how patches can be easily managed and can fix security flaws and vulnerability. Patch management tools and software lessens security failure by applying security patches at the right time, increases productivity and enhance applications with new features.

What is the purpose of a self-assessment (such as the Holland Code)? Select one: a. To systematically write a mission statement and set goals and key performance indicators b. To systematically reflect on who you are as a person, including your interests, personality traits, and goals c. To systematically determine your strengths and weaknesses d. To systematically determine the major and career a student must pursue

Answers

Answer:

Option B.

Explanation:

Self assessment is basically used to gauge the performance and ability of a person. It also helps to identify the goals and interests.

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
A. router
B. hub
C. virtual private network
D. SIEM device

Answers

Answer:

The correct answer to the following question will be Router.

Explanation:

Mainly router is an standard device used in networking between computer networks and is connected from the different data lines from IP networks. So many of the company's managers will recommend a router for any networking-related work.

The other three options like, hub basically works as a center of activity from which the devices can be connected, Virtual private network (VPN) is a private type of network for ex. Internet and SIEM (Security Information and Event Management) device provides security alerts that are generated by network hardware.

Hence, a very suitable device will be a Router for a company.

Seeing if a website has a , .gov, .edu, or .org URL can give you information about the _________ of a website.

Answers

Answer:  Credibility

Explanation:

Government and education websites are the most trusted websites

You have recently completed a review of company network traffic and saw where most of the malware infections are caused by users who visit illicit websites. You would like to implement a solution that will block these websites while scanning all network traffic for signs of malware and block the malware before it enters the company network. Which technology would be the best solution?A) IDSB) FirewallC) UTMD) SIEM

Answers

Answer:

UTM

Explanation:

UTM (Unified Threat Management) is a devices that include firewall, IDS (Intrusion Detection System), SIEM(security information and event management), antivirus and some other devices. The IDS detects intrusions or malicious activity, the firewall blocks unwanted incoming traffic and a SIEM is used for log aggregations.

The operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true is ___________.
a. $$
b. !!
c. II
d. &&

Answers

Answer:

C) ||

Explanation:

In java, the Operator || called the logical or will return true when of the statements is true. for example, cosider this java code snippet

public class ExampleClass {

 public static void main(String[] args) {

   int y = 5;

   System.out.println(y > 3 || y < 4);

// returns true because one of the conditions are true (5 is greater than 3, but 5 is not less than 4)

 }

}

The operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true is _

C) ||

According to the given question, we are asked to show the operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true.

As a result of this, we can see that a Boolean value is one that returns two values: true or false, based on a set of pre-given conditions. With this in mind, when using a High Level Language like Java, Operator II would return either true or false when its conditions are met

Therefore, the correct answer is option C

Read more here:

https://brainly.com/question/2467366

When an object is selected in Visual Studio, ____________________ and a heavier border appear on the outer edges of the object.

Answers

Answer:

Size Handlers

Explanation:

In Visual Studio, the fields, images, text boxes are considered as objects. Editing reports and applying same changes on the objects require objects to be selected. When a object is selected (by clicking on it), a frame appears around it along with squares. These squares are called size handlers. They allow users to change the size of an object. Object can be make longer, wider, smaller by using size handlers. Hence sizing handle is a tool used for resizing an object.

What is transmission control protocol?
the rule that defines parameters for the quality of data transmitted between computers and networks
the rule that defines how packets of data are transmitted between computers and networks
the rule that dictates how long it takes to identify an IP address
the rule that dictates what kind of network will support a specific protocol

Answers

Answer:

the rule that defines how packets of data are transmitted between computers and networks

Explanation:

Transmission control protocol is full form of TCP and Internet protocol  are used in combination to transmit the data and packets between network and computer. These protocols are used to communicate different devices that are interconnect on the network via internet.

Answer:

the rule that defines parameters for the quality of data transmitted between computers and networks

Explanation:

ed 2021

You learned that properly edited resumes are necessary for making a good impression on a university or a potential employer. Discuss the consequences of submitting a poorly edited and formatted resume while looking for a job or pursuing higher studies.

Answers

Answer:

Resume is the important document for job seekers. As much as the resume is better, there is more chance to grab the job.

If the resume is poor, the employer may not call you for the interview.

Explanation:

Resume is the document that create and impression over the potential employer or university.

If someone have very good hard and soft skills, and does not mention all the skills in resume, then employer could not that skills that you may have. Because your resume is the document that represent you when you are not in front of the employer.  This is the first document, presented that, what  you are and how you are beneficial for the company.

If your resume is poor it may cause that He cannot call you for the interview or not considered for that JOB.

Answer: Something poorly edited or revised can look bad to employers or colleges. It shows that you either rushed or didn’t give enough thought to the work you did. On the other hand, submitting something well polished looks great to business hiring and colleges looking for their next top scholars.

Explanation: PLATO

What is the correct HTML for making a text input field?

A.
B.
C.
D. Next ❯

Answers

Answer:

Option (B)

Explanation:

For taking an input in text form in html we use <input> tag. This tag does not need to be closed as it does not have any end tag in HTML. This input tag is of various types like submit,button,password,etc. To output an empty text field in which text input should be entered, <input> tag of type text should be used.

What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT

Answers

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the highest priority to meet his needs. He’s a software developer and runs multiple VMs to test his applications. He also designs some of his own graphics, and he plays online games when he’s not working. Which of the following priorities would be most important for Mykel’s computer?a. High-end graphics card, RAID array, and lots of RAMb. High-end CPU, lots of RAM, and high-end graphics cardc. Multiple hard drives, lots of RAM, and high-end CPUd. High-end graphics card, expansion audio card, and lots of RAM

Answers

Answer:

Option B

Explanation:

Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the highest priority to meet his needs. He’s a software developer and runs multiple VMs to test his applications. He also designs some of his own graphics, and he plays online games when he’s not working.

High-end CPU, lots of RAM, and high-end graphics card priorities would be most important for Mykel’s computer to implement his work.

You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard drive. You attempt to remove it from the domain, but the procedure fails. You take the DC offline permanently and will replace it with another DC of the same name. What must you do before you can replace the DC?

Answers

Answer:

perform a metadata cleanup

Explanation:

Based on the information provided within the question it can be said that in this situation the the first thing you must do is perform a metadata cleanup. This is a procedure that must be used every time when forcibly taking a DC offline, this will remove all data from the Active Directory Domain Services that identifies a DC to the replication system. Allowing you to replace it with another DC of the same name.

You can use a(n) ____ to visually separate related controls from other controls on the form.

Answers

Answer:

The correct answer to the following question will be Group Box.

Explanation:

Group Box:

A type container that contains many types of controls that are usually related to each other in the form.It usually provides the identified grouping for other controls.used for the subdivision of the forms.Separation of the controls can be done with the help of grouping by group box.

Which of the following must be added to a VLAN with a gateway in order to add security to it?

Answers

Answer:

A SSH configuration with password and username and a IP address and subnet mask to the Vlan.

Explanation:

Vlan also called virtual lan or switch virtual interface, is used to assign an IP address, subnet mask and a default gateway address, to make configuration of switches and routers remote through SSH or telnet.

By default, the Vlan comprises of all the ports in an intermediate device like routers and switches.

The SSH configuration is a low encrypted channel of port number 22, with required username and password.

True or False. Dragging the pointer over the font list allows you to preview how selected text will look if the highlighted font is applied.

Answers

Answer:

True is the correct answer for the above question-statement.

Explanation:

In MS-Powerpoint, when a user highlights the selected text and he wants to preview the highlighted text to see what how it will look like for that he needs to move the mouse pointer to the font list and click the preview button to see the preview of that text.

The above question also states the same statement which is described above, hence it is a true statement.

A key feature of an enterprise system is that _________.

a. it is exclusive to small and medium-sized enterprises (SMEs)
b. it employs a database of key operational and planning data that can be shared by all
c. it helps a business function isolate information other functions and other levels of management.
d. it is only used by large organizations

Answers

Answer:

Option B is the correct option to the following question.

Explanation:

Because the following options are the feature of the ERP or Enterprise system, It is an application or software that involves in related to the computer system like accounting, database handling, automation, etc and it is the software of large-scale packages that enables they can controls all the business operations easily.

Other options are incorrect because these are not the features of the Enterprise System.

Answer:

Option (b) is the correct answer.

Explanation:

An Enterprise system (also called as ERP) is used to store all the functional details of the organization. for example, it is used to store the employee data, planing data and customer data for future use. ERP is used by any of the organization either it is small or long organization. It is a software which has the database to store the organization data which is shared among all the managerial-level employee of the organization.

Option b also suggests the same, hence it is correct while other is not because-

Option "a" suggests that it is a combination of the large and small organization but one organizational ERP is different from other organizational ERP.Option c suggests that it distract the business work from the organizational work but it stores all the information.Option d suggests that it is only for the large organization but it is for all types of organization.

Your app needs to store the following information. For each type of information, decide whether you would use an array or a variable to store it:________.

a.All the messages a user has sent.
b.The highest score a user has ever reached on the app.
c.A username and password to unlock the app.

Answers

Answer:

The answer is "option c".

Explanation:

In the question, It is defined that an array variable that stores the value. This variable is used to store more than one value or in programming terms, we can say that an array is a collection of the homogeneous elements, that means it will store similar type of value that is "text value or numeric value"if we would use an array to store all messages that are sent by the user, however, the highest value of the score is stored in variable that would be a better choice for a password/username.That's why option c is correct.

Answer:

Array

Variable

Array

Explanation:

A filtering system designed for use by Web site owners is available through the ____, a nonprofit organization whose members include Internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft, and Verizon.

a. Anti-Defamation League (ADL)
b. Electronic Privacy Information Center
c. Internet Content Rating Association (ICRA)
d. Electronic Frontier Foundation

Answers

Answer:

The answer is C. Internet Content Rating Association (ICRA)

Explanation:

The Internet Content Rating Association (ICRA) is a non profit organization whose members include internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft and Verizon.The Electronic Privacy Information Center (EPIC) mission is to focus public attention on emerging privacy and related human rights issues. EPIC works to protect privacy, freedom of expression, and democratic values, and to promote the Public Voice in decisions concerning the future of the Internet. The Anti-Defamation League (ADL) is a global leader in exposing extremism and delivering anti-bias education, and is a leading organization in training law enforcement. ADL is the first call when acts of anti-Semitism occur. ADL's ultimate goal is a world in which no group or individual suffers from bias, discrimination or hate.The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group founded to promote Internet civil liberties.

Amy just added a 462 meter run of fiber optic cable to the network what should she do next?

Answers

Answer:

test it.

Explanation:

Based on the information provided within the question it can be said that the next logical step after installing the 462 meter run of cable would be to test it. This is done in order to make sure that there were no malfunctions during installation and that everything is running through the cable correctly. To test the cable you must perform an end-to-end attenuation test which will verify the quality of the installation as well as ensure high quality system performance.

What should be done on a tablet in order for that tablet to cease all network connections?
Turn on Airplane Mode
Turn off Cellular
Turn off Location services
Turn off Wi-Fi

Answers

To cease all network connections on a tablet, we could do: Turn on Airplane Mode.

Airplane Mode (sometimes referred to as Flight mode) is a feature of tablets, laptops and cellphones that terminates radio-frequency signals which could be transmitting from devices to the internet and communication signal source.  This includes, bluetooth, wireless internet and data connection.

A ____ is optimized for decision support and is generally represented by a data warehouse or a data mart.

Answers

Answer:

'Datastore' is the correct answer to fill the question statement.

Explanation:

Datastore is a term which is used to store the data with the help of various technology like- database or file system.

Data warehouse and data mart also used to store the data in which data warehouse is used to collect the historical and operational data whereas data mart is used to store the summarized data which is used for analysis purpose. A Decision support system is used to analyze the stored data and make it for the decisions.

The question scenario states that which is represented by the data warehouse or data mart and that can be optimized for the decision support system. So the answer is a 'datastore' because it is used to store the data like 'data warehouse' or data mart (as described above) and also can be optimized for the Decision support system because Decision support system s used to analyze the stored data and make it for the decisions.

Hence 'Datastore' is the correct answer.

need help with this please and thanks

Answers

Answer:

Connector names are written below Picture vise:USB-CUSB 2.0Micro USB

Explanation:

Following is the brie Illustration of the terms used:

USB-C:

              It is the newest connector in the market with the             reversible/symmetrical design. It can be adapted to work with the legacy connectors such as USB-A, USB-B, USB-C and Micro USB.

USB 2.0:

              It is used mostly in the connections of electronic devices such as printers and smartphones. It has A to B connectors as well as micro USB connectors and mini USB connectors.

Micro USB:

              It is used for the connection o compact devices such as smartphone and mp3 players. They are further grouped into three categories: Micro A, Micro B and micro USB 3.

I hope it will help you!

Write a function double average(int arr[] , int n), that returns the average of the even elements of the array. If the array has no even elements, throw an integer-based exception containing the value 0. The number of elements in the array is specified by the parameter n.

Answers

Answer:

double average(int arr[], int n){

int evenElementCount = 0;

double sum = 0;

for( int i = 0; i < n; i++) {

if( arr [ i ] % 2 == 0 && arr [ i ] != 0 ){

evenElementCount += 1;

sum+=arr[i];

}

}

if(evenElementCount == 0)

throw 0;

return sum/evenElementCount;

}

Explanation:

The Method called average takes in an array and number of elements, it loops through the array using a for-loop to find all the even elements in the array, it stores the number of even elements in a variable named evenElementCount, it throws an integer-based exception if the evenElementCount variable is 0, returns average of even elements if the evenElementCount variable is not 0.

Which of the following represent correct syntax to display first name from global variable user? Select the one correct answer.
a. {User.FirstName}
b. {!User.FirstName}
c. $User.FirstName
d. {!$User.FirstName}

Answers

Answer:

Option D i.e., {!$User.FirstName} is the correct answer.

Explanation:

The following option is correct because in the following statement, the user programmer will ask to display the first name by using the global variable then, in the PHP Programming Language the following is the correct way to display the first name of the user, which is inside the curly braces then, not operator and then, name of the variable through which it call.

Final answer:

The correct syntax to display the first name from the global variable user is option d. {!$User.FirstName}, which is used in platforms like Salesforce that require merge field syntax.

Explanation:

The correct syntax to display the first name from a global variable user is d. {!$User.FirstName}. This syntax is typically used in Salesforce or similar platforms where the merge field syntax is required. The exclamation mark and curly braces indicate that it is a dynamic reference to a variable's property, and the dollar sign indicates that it is a global variable.

If you are working within a different context, such as pure JavaScript or another programming language, this syntax may not be applicable, and the correct syntax for accessing object properties might differ.

Performance-related data from what document is used to develop the After-Action Report (AAR)?

Answers

Answer:

The answer is "EEGs".

Explanation:

EEGs stands for Exercise Evaluation Guides, It is designed to collect information related specifically to the evaluation criteria defined by the EP (Exercise Planning)Committee.

It is an organization that assesses the capacity to perform a task, role or goal.It is an evaluation based on the performance of critical tasks for the selected capability at specific levels.

When modifying a theme, the _______ gallery is used to pair a title font and a body font?

Answers

Answer:

Font gallery.

Explanation:

The theme in Microsoft Powerpoint includes the design of background, font and layouts. We can change the theme fonts by choosing a pair of title font and a body font from the Font Gallery in Powerpoint.

To access the Font Gallery, just go to the View Tab and click on "Slide Master".

Next look for "Fonds" drop down list and pick one of the pair of title font and body font from the list. The selected fonts will be applied to text on the slides.

Answer:

Font gallery.

Explanation:

The theme in Microsoft Powerpoint includes the design of background, font and layouts. We can change the theme fonts by choosing a pair of title font and a body font from the Font Gallery in Powerpoint.

To access the Font Gallery, just go to the View Tab and click on "Slide Master".

Next look for "Fonds" drop down list and pick one of the pair of title font and body font from the list. The selected fonts will be applied to text on the slides.

Explanation:

After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices on the LAN. He verifies that the IP address and subnet mask are in the correct IP subnet. While the technician is troubleshooting, another user complains that she can no longer access the network. No other users seem to be having any problems. What could be the cause of the problem?

Answers

Answer:

Duplicate IP address

Explanation:

A duplicate IP address means the technician assigned an IP address that is part of the DHCP pool and is already being used by another computer on the network. This causes an IP conflict which denies both users access to the internet. IP conflicts can be resolved by allowing DHCP to assign an IP address to the computer, then once the IP address has been assigned convert it to a static address.

You can change the __________ of labels and values in cells to be left, right, or center.

Answers

Answer:

Alignment

Explanation:

Microsoft Excel is used to analyze data. It is a spread sheet application, divided into rows and columns. The small blocks on the page are called cells.To input data into a cell, click on the cell and type in the entry.

Entries in a cell can be align to the left, right, center, top or down, depending on the width and height of the column or row it is in. To align an entry, click on the cell, go to the home tab or right click and pick the alignment suitable.

Other Questions
A carpet square is 9inches whats the area of the carpet square? A curve plotted as a function of frequency defining the sound pressure level required to give equal loudness is? What is 653,228 rounded to the nearest thousand Suppose the rate of return on a 10-year T-bond is 6.90%, the expected average rate of inflation over the next 10 years is 2.0%, the MRP on a 10-year T-bond is 0.9%, no MRP is required on a TIPS, and no liquidity premium is required on any Treasury security. Given this information, what should the yield be on a 10-year TIPS? Disregard cross-product terms, i.e., if averaging is required, use the arithmetic average. The generals claim he has one rather promising prospect for tomorrows hunt is an example of _________is a procedure used to study the structure of the mind, the main method of investigation for structuralists; looking into one's own mind for information. A ____________ gap between GDP and NDP indicates an increasing obsolescence/depreciation of capital goods..A. growing CB. shrinkingC. constantD. all the above boy pulls a 5.0-kg sled with a rope that makes a 60.0 angle with respect to the horizontal surface of a frozen pond. The boy pulls on the rope with a force of 10.0 N; and the sled moves with constant velocity. What is the coefficient of friction between the and the ice? (a) 0.09 (b) 0.12 (c) 0.18 (d) 0.06 (e) 0.24 With the approach of night, our body temperatures begin to drop. This best illustrates the dynamics of the ________.a. hypnagogic stateb. circadian rhythmc. alpha wave patternd. REM rebounde. latent content. Every insurance administrator must file a surety bond with the commissioner which is writtten for an amount of at least? "Which of the following would be classified as investment in the national income accounts? A) An increase in corporate stock volumes during the year. B) The purchase of medical supplies by the National Guard. C) An increase in government spending. D) An increase in business inventories. for the reaction: magnesium atom + oxygen atom --> magnesium oxide. draw the Lewis electron dot diagram for each substance and use arrows to illustrate electron movement. A football team plays in a large stadium. With a ticket price of $19, the average attendance at recent games has been 50 comma 000. A market survey indicates that for each $1 increase in the ticket price, attendance decreases by 300. a. Express the number of spectators at a football game, N, as a function of the ticket price, x. b. Express the revenue from a football game, R, as a function of the ticket price, x. Just as the Reconquest of Spain from the Moors established patterns that would be repeated in Spanish New World colonization, the methods used in which of the following countries anticipated policies England would undertake in America? 1. Ireland 2. Wales 3. Scotland 4. India 5. China Which was NOT among the important reforms carried out by Solon in the 570s B.C.? Select one: a. measures encouraging the cultivation and export of olive oil b. canceling the enormous debts of poor farmers c. allowing all male citizens to hold government office d. reducing the political power of the wealthiest families e. creating a court of appeal The researcher has limited resources. He sends 9 emails from a Latino name, and 14 emails from a non-Latino name. For the Latino names, the mean response time was 421 minutes (standard deviation of 82 minutes). For the non-Latino names, it was 366 minutes (standard deviation of 101 minutes). Calculate the standard error for the difference in means. Pls help ASAP this questions are science questions ( biology chemistry physics)46 I think a 47 I think d 49 I think a 50 I think a 51 idk 54 I think d 55 idk 56 idk57 idk58 I think d 59 idk 61 idk 62 I think a Your company intends to open a new office on the other side of the country. The goal is to expand the company's operations and move into some newer, more exclusive markets. This is a major step for the company, and you want your shareholders to be impressed. Which type of correspondence should you use to communicate with your shareholders? The general ledger shows a balance of $ 66 comma 200 in the Merchandise Inventory account at the end of the period. The physical inventory count shows inventory of $ 63 comma 000. (Assume a perpetual inventory system.) The adjusting entry includes a ________. Suppose the interval [4,6] is partitioned into n=4 subintervals. What is the subinterval length x? List the grid points x0, x1, x2, x3, x4. Which points are used for theleft, right, and midpoint Riemann sums? Steam Workshop Downloader