which two functions of a firewalls in an enterprise network are true (choose two)

Answers

Answer 1

Answer:

A. They can use information about previous packets to make decisions about future packets.

E. They are more susceptible to DoS attacks than stateless firewalls

Explanation:

Assuming the following options:

A. They can use information about previous packets to make decisions about future packets.

B.  They are most effective when placed in front of the router connected to the Internet

C. They can track the number of active TCP connections

D. They can fitter HTTP and HTTPS traffic in the inbound direction only

E. They are more susceptible to DoS attacks than stateless firewalls

A firewall by definition is a "software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks connected to the Internet".

The basic purpose of a firewall is to control the traffic that is allowed to traverse from the internet.  

Option A is correct since they use previous info in prder to make decisions about a site.

Option B is not true since the firewall is a software that not depends of the router connection to the internet, since the web is open for any IP.

Option C is not correct isnce the purpose for the firewalls is not analyze the acitve connections.

Option D is not correct since they can work in both directions and no present limitations in order to filter web pages to classify the info.

Option E is correct since one characteristic of the stateless firewalls compared to the stateful firewalls. Since "Stateless firewalls watch network traffic and restrict or block packets based on source and destination addresses or other static values" and present more security comaprd to the stateless stateful.

Answer 2

Final answer:

The correct options are A. They can use information about previous packets to make decisions about future packets and C. They can track the number of active TCP connections. Firewalls in an enterprise network can use information about previous packets and track the number of active TCP connections to enhance network security.

Explanation:

Two functions of firewalls in an enterprise network:

They can use information about previous packets to make decisions about future packets: Firewalls can track the state of connections and use this information to determine whether incoming packets are part of an established connection or if they are trying to initiate a new, potentially unauthorized connection.

They can track the number of active TCP connections: Firewalls can monitor the number of active Transmission Control Protocol (TCP) connections to ensure network resources are not overwhelmed by excessive connections or potential cyber threats.


Related Questions

What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
A. classification
B. trend analysis
C. association
D. clustering

Answers

I believe the answer is (A) classification. Have a nice day :)

True or False. Dragging the pointer over the font list allows you to preview how selected text will look if the highlighted font is applied.

Answers

Answer:

True is the correct answer for the above question-statement.

Explanation:

In MS-Powerpoint, when a user highlights the selected text and he wants to preview the highlighted text to see what how it will look like for that he needs to move the mouse pointer to the font list and click the preview button to see the preview of that text.

The above question also states the same statement which is described above, hence it is a true statement.

Write a function double average(int arr[] , int n), that returns the average of the even elements of the array. If the array has no even elements, throw an integer-based exception containing the value 0. The number of elements in the array is specified by the parameter n.

Answers

Answer:

double average(int arr[], int n){

int evenElementCount = 0;

double sum = 0;

for( int i = 0; i < n; i++) {

if( arr [ i ] % 2 == 0 && arr [ i ] != 0 ){

evenElementCount += 1;

sum+=arr[i];

}

}

if(evenElementCount == 0)

throw 0;

return sum/evenElementCount;

}

Explanation:

The Method called average takes in an array and number of elements, it loops through the array using a for-loop to find all the even elements in the array, it stores the number of even elements in a variable named evenElementCount, it throws an integer-based exception if the evenElementCount variable is 0, returns average of even elements if the evenElementCount variable is not 0.

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it?A. The BIOS needs a firmware update.B. The BIOS is corrupt.C. Hardware-assisted virtualization is enabled in the operating system, not the BIOS. D. The firmware is corrupt.

Answers

Answer:

this is difficult

Explanation:

i also need helo with this question

You can use a(n) ____ to visually separate related controls from other controls on the form.

Answers

Answer:

The correct answer to the following question will be Group Box.

Explanation:

Group Box:

A type container that contains many types of controls that are usually related to each other in the form.It usually provides the identified grouping for other controls.used for the subdivision of the forms.Separation of the controls can be done with the help of grouping by group box.

A filtering system designed for use by Web site owners is available through the ____, a nonprofit organization whose members include Internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft, and Verizon.

a. Anti-Defamation League (ADL)
b. Electronic Privacy Information Center
c. Internet Content Rating Association (ICRA)
d. Electronic Frontier Foundation

Answers

Answer:

The answer is C. Internet Content Rating Association (ICRA)

Explanation:

The Internet Content Rating Association (ICRA) is a non profit organization whose members include internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft and Verizon.The Electronic Privacy Information Center (EPIC) mission is to focus public attention on emerging privacy and related human rights issues. EPIC works to protect privacy, freedom of expression, and democratic values, and to promote the Public Voice in decisions concerning the future of the Internet. The Anti-Defamation League (ADL) is a global leader in exposing extremism and delivering anti-bias education, and is a leading organization in training law enforcement. ADL is the first call when acts of anti-Semitism occur. ADL's ultimate goal is a world in which no group or individual suffers from bias, discrimination or hate.The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group founded to promote Internet civil liberties.

The Solution Explorer window ____.

a. displays items that you can use when creating a project
b. displays the classes, methods, and properties included in a solution
c. displays data connections and servers
d. displays a list of the projects contained in the current solution

Answers

Answer:

The correct answer for the given question is option(d).

Explanation:

Solution Explorer is found in Microsoft Visual Studio.When we create a project in the c# or another programming language the solution explorer window is used. The Solution Explorer takes care of the projects and files.  

Solution Explorer displays an overall view of the current project. In the Solution Explorer we can delete or add the file in the project. The  Solution Explorer window displays the list that is contained in the current solution.

Option(a),Option(b) and Option(c) are the incorrect option for the Solution Explorer window. So, Option(d) is the correct answer for the solution explorer.

d. displays a list of the projects contained in the current solution.

The Solution Explorer window in an Integrated Development Environment (IDE) like Visual Studio typically displays the projects, files, and resources contained within a solution. It provides a hierarchical view of the components of your software project, allowing you to navigate through the different files and folders, manage project dependencies, and access various project settings. It's an essential tool for organizing and managing the structure of your solution.

Your app needs to store the following information. For each type of information, decide whether you would use an array or a variable to store it:________.

a.All the messages a user has sent.
b.The highest score a user has ever reached on the app.
c.A username and password to unlock the app.

Answers

Answer:

The answer is "option c".

Explanation:

In the question, It is defined that an array variable that stores the value. This variable is used to store more than one value or in programming terms, we can say that an array is a collection of the homogeneous elements, that means it will store similar type of value that is "text value or numeric value"if we would use an array to store all messages that are sent by the user, however, the highest value of the score is stored in variable that would be a better choice for a password/username.That's why option c is correct.

Answer:

Array

Variable

Array

Explanation:

A _______________ is most often a device with a tablet form factor that is designed to integrate with a detachable keyboard.

Answers

Answer:

Ultra book convertable / tablet hybrid

Explanation:

In recent times laptops comes out in a fashion that makes them take the form of tablets, they come with a detachable keyboard which reduces the power consumption and boost performance. the keyboard is used when attached and the touch screen is used when detached, giving you the best experience if both laptops and tablets.

Final answer:

A 2-in-1 PC is a versatile device designed to function both as a tablet and a traditional laptop when combined with a detachable keyboard. This reflects the personal nature of modern computing. Graphics tablets, which also use induction principles, differ by converting stylus-induced magnetic fields into digital images.

Explanation:

A 2-in-1 PC is most often a device with a tablet form factor that is designed to integrate with a detachable keyboard. This versatile computing device represents the evolution of personal computing, as each individual shapes their unique relationship with technology. Unlike traditional laptops or desktops, 2-in-1 PCs offer the portability of a tablet with the full functionality of a computer when connected to a keyboard.

Graphics tablets are another type of device that utilize passive tablets with induction principles for digital image creation. They differ from the touch tablets, as they have an intricate grid of wires and use a magnetic field from a stylus to create changes in electromagnetic fields, which are then translated into digital lines or strokes on the screen.

__________ describes a module for which the software developer does not care how the processing is performed, but instead, knows that the code, when provided valid inputs, will produce predictable results.

Answers

Answer:

The correct answer for the following question is "Black Box Testing" .

Explanation:

The black box is a software testing in which it works overall specification of the application rather than the internal structure of the application.The main aim of this kind of testing to check the functionality of the overall system.

In the black box testing when valid inputs are performed the predictable results is produced rather then it focuses on the processing. The advantages of black-box testing is given below.  

it hides the internal structure of the program.  focus on the output rather than the implementation. This type of testing takes less time to test the module of the code.

When researching the new power supply, what feature does James need to look for to make sure he has enough power to run his computer with the new video card?

Answers

Answer:

Power in watts also called Wattage

Explanation:

Power supply needs to have enough power to run a device or a computer, in a case where the device's wattage is greater than that of the power supply the power supply won't work. the solution will be to get a power supply with enough wattage to power the device or computer, considering the fact that video cards' wattage has increased in recent times.

A ____ is optimized for decision support and is generally represented by a data warehouse or a data mart.

Answers

Answer:

'Datastore' is the correct answer to fill the question statement.

Explanation:

Datastore is a term which is used to store the data with the help of various technology like- database or file system.

Data warehouse and data mart also used to store the data in which data warehouse is used to collect the historical and operational data whereas data mart is used to store the summarized data which is used for analysis purpose. A Decision support system is used to analyze the stored data and make it for the decisions.

The question scenario states that which is represented by the data warehouse or data mart and that can be optimized for the decision support system. So the answer is a 'datastore' because it is used to store the data like 'data warehouse' or data mart (as described above) and also can be optimized for the Decision support system because Decision support system s used to analyze the stored data and make it for the decisions.

Hence 'Datastore' is the correct answer.

Which of the following represent correct syntax to display first name from global variable user? Select the one correct answer.
a. {User.FirstName}
b. {!User.FirstName}
c. $User.FirstName
d. {!$User.FirstName}

Answers

Answer:

Option D i.e., {!$User.FirstName} is the correct answer.

Explanation:

The following option is correct because in the following statement, the user programmer will ask to display the first name by using the global variable then, in the PHP Programming Language the following is the correct way to display the first name of the user, which is inside the curly braces then, not operator and then, name of the variable through which it call.

Final answer:

The correct syntax to display the first name from the global variable user is option d. {!$User.FirstName}, which is used in platforms like Salesforce that require merge field syntax.

Explanation:

The correct syntax to display the first name from a global variable user is d. {!$User.FirstName}. This syntax is typically used in Salesforce or similar platforms where the merge field syntax is required. The exclamation mark and curly braces indicate that it is a dynamic reference to a variable's property, and the dollar sign indicates that it is a global variable.

If you are working within a different context, such as pure JavaScript or another programming language, this syntax may not be applicable, and the correct syntax for accessing object properties might differ.

What is VoIP?

a. VoIP uses IP technology to transmit telephone calls.
b. VoIP offers the low cost ability to receive personal and business calls via computer.
c. VoIP offers the ability to have more than one phone number.
d. VoIP offers all of these.

Answers

Answer:

D) offers all the given options

Explanation:

VoIP also referred to as  IP telephony, Internet telephony or broadband telephony are  technologies that has made phone, video and general multimedia communication over the internet possible. It allows low cost because the communication infrastructure is shared between data and voice,  and can be used by both individuals and businesses

Seeing if a website has a , .gov, .edu, or .org URL can give you information about the _________ of a website.

Answers

Answer:  Credibility

Explanation:

Government and education websites are the most trusted websites

When modifying a theme, the _______ gallery is used to pair a title font and a body font?

Answers

Answer:

Font gallery.

Explanation:

The theme in Microsoft Powerpoint includes the design of background, font and layouts. We can change the theme fonts by choosing a pair of title font and a body font from the Font Gallery in Powerpoint.

To access the Font Gallery, just go to the View Tab and click on "Slide Master".

Next look for "Fonds" drop down list and pick one of the pair of title font and body font from the list. The selected fonts will be applied to text on the slides.

Answer:

Font gallery.

Explanation:

The theme in Microsoft Powerpoint includes the design of background, font and layouts. We can change the theme fonts by choosing a pair of title font and a body font from the Font Gallery in Powerpoint.

To access the Font Gallery, just go to the View Tab and click on "Slide Master".

Next look for "Fonds" drop down list and pick one of the pair of title font and body font from the list. The selected fonts will be applied to text on the slides.

Explanation:

In defining security implemention, what are the roles of the following committees. 1) gateway committee 2) project committee 3) security compliance committee

Answers

In network, security plays important roles and implementing is a big task.

1. Gateway committee: It protects the hackers and any malware spyware to attack the network. Once hardware appliance is installed schedule update is happening at regular interval time.

2. Project committee:- it is an implementation plan and with minimum downtime in network and restoring the network and bring back the activities of the network.

3. Security compliance committee: - The network administrator has to select proper hardware appliance and to place in a network with minimum downtime.

Name a process of deleting data by sending an eraser to clear the instruction in an address of nonvolatile memory.

Answers

Answer:

Data in Rest / Data at Rest

Explanation:

According to literature; there are basically three states associated with digital data .

1. Data in Rest

2. Data in Transit / Motion  

3. Data in Use

Data-in-rest corresponds to the data permanently stored in non-volatile memory such as hard drive, SSD, cloud storage etc. this data is inactive since it is not being currently processed or transmitted that’s why it is called data at rest.

Data-in-transit corresponds to the data temporarily stored in volatile memory such as RAM or it is being currently transmitted to a network that’s why it is called data in transit.

Data-in-use corresponds to the data that is being used by some applications and is in process of being updated/erased and is being used by the user at any endpoint.

need help with this please and thanks

Answers

Answer:

Connector names are written below Picture vise:USB-CUSB 2.0Micro USB

Explanation:

Following is the brie Illustration of the terms used:

USB-C:

              It is the newest connector in the market with the             reversible/symmetrical design. It can be adapted to work with the legacy connectors such as USB-A, USB-B, USB-C and Micro USB.

USB 2.0:

              It is used mostly in the connections of electronic devices such as printers and smartphones. It has A to B connectors as well as micro USB connectors and mini USB connectors.

Micro USB:

              It is used for the connection o compact devices such as smartphone and mp3 players. They are further grouped into three categories: Micro A, Micro B and micro USB 3.

I hope it will help you!

Matthew is working to select an authentication method for his company that will support REST as well as many web-based and mobile clients. Which of the following would be the best choice?A) ShibbolethB) RADIUSC) OpenID ConnectD) OAuth

Answers

Answer:

C) OpenID Connect

Explanation:

The best option is OpenID Connect because is based in OAuth, and supports multiple web based and mobile clients, and supports REST.

With OAuth, we cannot make any user authentication just provide a token to access data.

RADIUS is a networking protocol, and Shibboleth is a single sign-on log-in system for computer networks and the Internet, both not support REST.

You can change the __________ of labels and values in cells to be left, right, or center.

Answers

Answer:

Alignment

Explanation:

Microsoft Excel is used to analyze data. It is a spread sheet application, divided into rows and columns. The small blocks on the page are called cells.To input data into a cell, click on the cell and type in the entry.

Entries in a cell can be align to the left, right, center, top or down, depending on the width and height of the column or row it is in. To align an entry, click on the cell, go to the home tab or right click and pick the alignment suitable.

in python Write a loop that counts the number of lowercase characters that appear in the string referenced by mystring.

Answers

Answer:

mystring = "My name is David Acheme"

count = 0

for i in mystring:

    if(i.islower()):

        count=count+1

print("The number of lowercase characters in: "+mystring)

print(count)

Explanation:

1. We declare a String Variable and assign a value.

2. Intialize a count variable to zero.

3. Using a for loop is to loop through each characters in the string.

4. The if condition checks when a lower case character is encountered using the islower method and increases count by 1

5. Prints the value of count.

You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard drive. You attempt to remove it from the domain, but the procedure fails. You take the DC offline permanently and will replace it with another DC of the same name. What must you do before you can replace the DC?

Answers

Answer:

perform a metadata cleanup

Explanation:

Based on the information provided within the question it can be said that in this situation the the first thing you must do is perform a metadata cleanup. This is a procedure that must be used every time when forcibly taking a DC offline, this will remove all data from the Active Directory Domain Services that identifies a DC to the replication system. Allowing you to replace it with another DC of the same name.

To take private property through eminent domain, three steps must be taken by the state or local government. What are they?

Answers

Answer:

•The owner of the property must receive compensation on the property.

• The property must be useful to the general public.

• The owner must initiate due process in the court.

Explanation:

On the Visit screen, you will not see one of the following:
a. Eligibility
b. Access level
c. Home Address
d. None of the Above

Answers

Answer:

The answer is "Option b".

Explanation:

An access level denotes a set of data type permissions or restrictions, that reduces the access level, which is an effective way to reduce failure modes, debug time and system complexity. and other options are not correct, i.e. define as follows:

In option a, In some of the cases, the system provides security, which is responded by the server to check the Eligibility of user, that's why it is not correct.In option c, The home address is always shown on the URL, that's why it is not correct.

Which of the following must be added to a VLAN with a gateway in order to add security to it?

Answers

Answer:

A SSH configuration with password and username and a IP address and subnet mask to the Vlan.

Explanation:

Vlan also called virtual lan or switch virtual interface, is used to assign an IP address, subnet mask and a default gateway address, to make configuration of switches and routers remote through SSH or telnet.

By default, the Vlan comprises of all the ports in an intermediate device like routers and switches.

The SSH configuration is a low encrypted channel of port number 22, with required username and password.

Performance-related data from what document is used to develop the After-Action Report (AAR)?

Answers

Answer:

The answer is "EEGs".

Explanation:

EEGs stands for Exercise Evaluation Guides, It is designed to collect information related specifically to the evaluation criteria defined by the EP (Exercise Planning)Committee.

It is an organization that assesses the capacity to perform a task, role or goal.It is an evaluation based on the performance of critical tasks for the selected capability at specific levels.

A(n) __________ network is a high speed communications connection used to exchange data between production line equipment and other devices within a manufacturing facility.

Answers

Answer:

Industrial network

Explanation:

Networks is simply a medium to transfer data and one example is an industrial network which is a high speed communications connection network that deal with the exchange of data on a large scale between the production line equipment and other devices within a manufacturing facility.

The operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true is ___________.
a. $$
b. !!
c. II
d. &&

Answers

Answer:

C) ||

Explanation:

In java, the Operator || called the logical or will return true when of the statements is true. for example, cosider this java code snippet

public class ExampleClass {

 public static void main(String[] args) {

   int y = 5;

   System.out.println(y > 3 || y < 4);

// returns true because one of the conditions are true (5 is greater than 3, but 5 is not less than 4)

 }

}

The operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true is _

C) ||

According to the given question, we are asked to show the operator that combines two conditions into a single Boolean value that is true when at least one of the conditions is true.

As a result of this, we can see that a Boolean value is one that returns two values: true or false, based on a set of pre-given conditions. With this in mind, when using a High Level Language like Java, Operator II would return either true or false when its conditions are met

Therefore, the correct answer is option C

Read more here:

https://brainly.com/question/2467366

What is transmission control protocol?
the rule that defines parameters for the quality of data transmitted between computers and networks
the rule that defines how packets of data are transmitted between computers and networks
the rule that dictates how long it takes to identify an IP address
the rule that dictates what kind of network will support a specific protocol

Answers

Answer:

the rule that defines how packets of data are transmitted between computers and networks

Explanation:

Transmission control protocol is full form of TCP and Internet protocol  are used in combination to transmit the data and packets between network and computer. These protocols are used to communicate different devices that are interconnect on the network via internet.

Answer:

the rule that defines parameters for the quality of data transmitted between computers and networks

Explanation:

ed 2021

Other Questions
Describe how conquests resulted in the spread of Greek culture, or Hellenization? how could the election of 1860 & President Abraham Lincoln have contributed to sectional differences between the North and the South prior to the civil war? A sample of 28 elements is selected to estimate a 95% confidence interval for the variance of the population. The chi-square values to be used for this interval estimation are a. 16.151 and 40.113. b. 14.573 and 43.195. c. 15.308 and 44.461. d. 11.808 and 49.645. The Knights of Labor believed that conflict between capital and labor would disappear when...A. Labor would own and operate businesses and industriesB. The government owned the means of productionC. Workers accepted the concept of craft unionsD. Business would understand the principles of social justiceE. Labor controlled the government Draw a PPC for the US in 2019 for capital goods and consumer goods, and plot a point on the graph that might illustrate where the US currently allocates its resources. PLEASE HELP ME!!! Compose a character study on a character from a book, television show, graphic novel, or any media that you like. Identify one character from your selection choice and complete an in-depth character study on that one character. PLS HELP I'LL GIVE YOU BRAINLIEST The diagram shows models of both prokaryotic and eukaryotic cells. The diagram shows models of both prokaryotic and eukaryotic cells. Prokaryotic cells are considered to be the more primitive of the two. What is a similarity between eukaryotes and prokaryotes as illustrated by the models? A)Both contain ribosomes. B)Both contain mitochondria. C)Both are surrounded by a capsule. D)Both contain a membrane-bound nucleus. According to Maslow, our need for ________ must be met before we are prompted to satisfy our need for ________.A) Food; loveB) Self-esteem; adequate clothingC) Self-actualization; economic securityD) Political freedom; economic securityE) Religious fulfillment; adequate housing Sebastian was in a hotel lobby and took the elevator up 7 floors to his room. Then he took the elevator down 9 floors to the parking garage. He described his movement with the expression below. What determines the ""strength"" of your immune system? A projectile of mass m1 moving with speed v1 in the +x direction strikes a stationary target of mass m2 head-on. The collision is elastic. Use the Momentum Principle and the Energy Principle to determine the final velocities of the projectile and target, making no approximations concerning the masses. (Use the following as necessary: m1, m2, and v1.) The totality of learned, socially transmitted customs, knowledge, material objects, and behavior is known as What is the fiftieth term of the arithmetic sequence 3, 7, 11, 15, ... ?19915153203 Where did tecumseh flee to As part of a safety investigation, two 1600 kg cars traveling at 21 m/s are crashed into different barriers. A) Find the average force exerted on the car that hits a line of water barrels and takes 1.8 s to stop. B) Find the average force exerted on the car that hits a concrete barrier and takes 0.14 s to stop. Which accurately describes events of the Haitian Slave Revolt on the island of Hispaniola (formerly Saint-Domingue)?slaves revolted against Spain and its leader, Charles iv, to win their independence in 1788slaves revolted against Russia and its leader, Alexander i, to win their independence in 1825slaves revolted against France and its leader, Napolean Bonapart, to win their independence in 1804slaves revolted against Portugal and its leader, Maria i Francisca, to win their independence in 1777 Professor Hammond studies ethical behavior and designs a study to examine the amount of cheating at her school. At the beginning of class each day, she passes around a chart showing the dates of the class meetings, with boxes for students to initial if present. She photocopies the sheet after each class so that she can find if any students initial for days in the past that they were absent. The students are not aware that they were participating in the study until the end of the quarter. What standard of Ethical Standard 8 does this violate?A. Institutional ApprovalB. Offering Inducements for Research ParticipationC. Client/Patient, Student, and Subordinate Research ParticipantsD. Informed Consent to Research The scoring of modern IQ tests is such that IQs have a Normal distribution with mean100 and standard deviation 15. What is the approximate IQ of someone with a z-score of 0.93? The method of introspection was used by titchener to identify Which BEST describes the technique used to develop the author's purpose Steam Workshop Downloader