A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?

Answers

Answer 1

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.


Related Questions

Development
Select the correct answer from each drop-down menu.
What is DHTML?
DHTML is ______ . It’s allows you to add functionality such as ______

The answer options for part 1 are A: an updated version of html B: a version of html meant for mobile devices or C: a set of technologies that allows developers to create interactive websites. Part 2 answer options are A:loading pages in the background B:automatic sign in or C: drop down menus and roll over text

Answers

Answer:

Part 1: C

Part 2: C

Explanations:

Answer

DHTML is ______. It allows you to add functionality such as ______

a set of technologies that allows developers to create interactive websites drop-down menus and rollover text

I hope this help

BTW PLATO

You are researching a topic online. You follow a link on a science association's website, but the webpage will not load. What is the most reasonable hypothesis for this problem

Answers

The most reasonable hypothesis for this problem is that the domain name or uniform resource locator (URL) is invalid.

What is a website?

A website is a collective name for a series of webpages that are interconnected with the same domain name, so as to provide certain information to end users.

In this scenario, since the Internet is active, the most reasonable hypothesis why the webpage will not load is that the domain name or uniform resource locator (URL) is invalid.

Read more on websites here: https://brainly.com/question/26324021

#SPJ1

100 POINTS ANSWER CORRECTLY AND ANSWER QUICKLY I DONT HAVE MUCH TIME
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
Can you identify one syntax error and one logic error in these lines? Why do you think a programmer might have made the logic error?

Answers

Yes there's syntax error .

After if there's colon so the next line or code block should start after some spaces(min 4)

The correct code is

[tex]\tt def(a)[/tex]

[tex]\tt if\:a<10:[/tex]

[tex]\quad\tt print(a,"is\:greater\:than\:10")[/tex]

How do smartphone screens work?

Answers

Smartphones screens work Using electricity

Answer:

Touchscreens work using electricity. The screen is made of glass, an insulating material – it cannot carry an electric current.

Explanation:

Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c) 1 d)4 2. The computer equipmentwhich feeds the computer with data is called. a) Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed form it is termed as a) Softcopy output b) File c) Document d) Hardcopy output
4. Which computer device will convert human voice into digital voice? a) Projector b) Loudspeaker c) Microphone d) Joy. 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plott​

Answers

Answer:

1. 3

2. D (Input Device)

3. B (File)

4. C (Microphone

Because of the Patriot Act of 2001, law enforcement officials:

OA. can access your email
activity more easily.

OB. must periodically check your online activity.

OC. are not authorized to monitor your emails.

OD. need permission to view your text messages.

Answers

Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity.

What is the role of Patriot Act ?

The USA Patriot Act is known to be an Act that hinders and punishes terrorist attacks that is done in any part of the United States and abroad via enhanced law enforcement and others.

Therefore, Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity to see if there is threat to national security.

Learn more about Patriot Act from

https://brainly.com/question/25741451

#SPJ1

Answer:

A, can access your email activity more easily

Explanation:

Trust me its correct

At Universal Containers, the sales managers would like Opportunities that have NOT been updated in the past 30 days to automatically be flagged. How should a System Administrator implement this requirement

Answers

The System Administrator implement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.

What is a  Formula field?

This is known to be a read-only fields that often calculate a value through the use of other fields or a given  formula.

Note that The System Administrator implement his requirement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.

Learn more about System Administrator  from

https://brainly.com/question/27129590

#SPJ1

6.25 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. ex: if the input is:

Answers

def is_list_even(my_list):

   for i in my_list:

       if(i%2 != 0):

           return False

   

   return True

   

   

def is_list_odd(my_list):

   for i in my_list:

       if(i%2 == 0):

           return False

   

   return True

   

def main():

   n = int(input())

   lst = []

   

   for i in range(n):

       lst.append(int(input()))

   

   if(is_list_even(lst)):

       print('all even')

   

   elif(is_list_odd(lst)):

       print('all odd')

   

   else:

       print('not even or odd')

       

       

if __name__ == '__main__':

   main()

can I have some help?

Answers

I believe its A as the image provided says plain message

You have the following code:
----------------------------------------------------------------------------------------------
fruit_list = ["strawberries", "bananas", "apples", "grapes"]
total_cost = 0
for fruit in fruit_list:
if fruit in ["apples","bananas"]:
total_cost += 3
elif fruit == "cantaloupe":
total_cost += 5
elif fruit in ["raspberries","strawberries","grapes"]:
total_cost += 4
-------------------------------------------------------------------------------------------------

What will be the value of total_cost?

A.13
B.14
C.15
D.7

Answers

Answer:

7

Explanation:

We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.

Research the history of Internet in computers

Answers

Answer:

This allowed different kinds of computers on different networks to "talk" to each other. ARPANET and the Defense Data Network officially changed to the TCP/IP standard on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language.

The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network. .

Answers

Maybe the answer is “server”

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

This is about a software called GIMP

Answers

Answer:

The answer is Stroke

Explanation:

Stroke outlines objects on a layer

Answer:

The correct answer is Stroke.

Explanation:

Go to the Edit menu now and from here, click on the Stroke Selection option. A dialog box will open up where you need to select the Stroke Line option and then set up various options like solid line, line style, dash pattern, line width, etc. After setting up these options, press the Stroke option, and wooo u did it!

Hope this helps:) Goodluck!

An engineer installs a router on a business network so that users can connect to the Internet. What configurations does the engineer use to ensure the Internet access functions correctly

Answers

The configurations does the engineer use to ensure the Internet access functions correctly are Logical network, Logical host ID, and Default gateway.

What is a router explained?

A router is a tool that connects or greater packet-switched networks or subnetworks. It serves the number one functions: coping with visitors among those networks through forwarding information packets to their supposed IP addresses and permitting a couple of gadgets to apply the equal Internet connection.

The Logistics Network is what hyperlinks producers, suppliers, wholesalers, outlets and consumers; and is consequently a key aspect in the Supply Chain. Transport, warehouse and distribution centre operations are what hyperlink producers to cease consumers (at once or in-at once).

Read more about the Internet:

https://brainly.com/question/97026

#SPJ1

what ctrl to show the font dialog box​

Answers

Answer:

Ctrl + D key  [Same time]

Explanation:

Using this imput will allow you to see the font dialog box :D

Have a great day <3

Which draws a line while moving the pen 30 steps to the right?
from turtle import*
o drawright(30)
o move(30)
oright(30)
o forward(30)

Answers

Answer:

forward(30)

Explanation:

the turtle.forward command will move the turtle to the right

Advantages of using Unicode to represent data

Answers

Global source and binary.
Support for mixed-script computing environments.
Improved cross-platform data interoperability through a common codeset.
Space-efficient encoding scheme for data storage.
Reduced time-to-market for localized products.
Expanded market access.

Alma will make the honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year. In which of the following cases will Alma make honor roll?



1. Alma has a 3.84 GPA and misses 5 days of school


2. Alma has a 3.78 GPA and misses 2 days of school


3. Alma has a 3.68 GPA and misses 6 days of school


4. Alma has a 3.81 GPA and misses 3 days of school

Answers

Answer: 4. Alma has a 3.81 GPA and misses 3 days of school

Explanation: The others don't meet the requirments.

The only case where Alma will make honor roll is the fourth case where she has a 3.81 GPA and misses 3 days of school.

What is GPA?

GPA stands for Grade Point Average, and it is a measure of a student's academic performance in a given period.

It is calculated by assigning a numerical value to each grade received in a course and then averaging those values.

Based on the given criteria, Alma will make honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year.

Alma has a 3.84 GPA and misses 5 days of school: Alma has the required GPA, but she misses 5 days of school which is greater than the allowed 5 days. Therefore, she will not make honor roll.

Alma has a 3.78 GPA and misses 2 days of school: Alma misses less than 5 days of school, but her GPA is less than the required 3.80. Therefore, she will not make honor roll.

Alma has a 3.68 GPA and misses 6 days of school: Alma misses more than 5 days of school, and her GPA is less than the required 3.80. Therefore, she will not make honor roll.

Alma has a 3.81 GPA and misses 3 days of school: Alma has the required GPA and misses less than 5 days of school. Therefore, she will make honor roll.

Thus, Alma will only make honour roll if she has a 3.81 GPA and misses three days of school in the fourth case.

For more details regarding GPA, visit:

https://brainly.com/question/15170636

#SPJ2

Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he sees that the computer is running windows and has open applications. he decides to preserve as much data as possible by capturing data in memory. what should carl perform

Answers

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

A family just changed to a different mobile phone and data service provider. They now need take some time to transfer their content to new phones and learn the features of the new service. This is an example of a:

Answers

The above scenario is an example of  switching cost customers incur changing to a new supplier.

What id Switching costs?

This is known to be the the costs that a consumer gets or has due to the effect of changing brands, or products.

Note that the above is an example of  switching cost customers incur changing to a new supplier as they are said to be psychological, effort-based, and needs time.

Learn more about mobile phone from

https://brainly.com/question/917245

#SPJ1

9.2 lesson practice ​

Answers

Answer:

6 columns/items

Explanation:

grid starts off as an empty list ( [ ] ), so right now it has 0 items/columns.

After that, 3 new items ("frog", "cat", "hedgehog") have been appended to grid, it now has 3 items

Finally another 3 items are appended to grid ("fish", "emu", "rooster"), finally grid ends up with 6 items in total.

Mark this question for review To answer this question, complete the lab using information below. Launch Lab You are setting up on a small network. The owner of the network has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while maintaining security for the Home-PC and Home-PC2 computers. In this lab, your task is to complete the following: Use the appropriate network components to connect the two computers to the new ISP. • Place the Ethernet router with firewall capabilities on the Workspace. • Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports. Use the AC to DC power adapter to plug in the device. • Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet. In this lab, the networking devices are preconfigured with the correct settings to make the connection to the internet service provider (ISP) and the internet.

Answers

The appropriate network components steps to take to connect the two computers to the new ISP is given below.

What is the network components  about?

In carryout the above task, the first thing to do is click the Shelf, and widen the Networking Devices.

Other steps are:

Take the Ethernet router and firewall to the Workspace.Beyond the router, Click on Back to switch and change to the back view.Beyond the switch, Click on Back to switch to change to back view of the switch.Beyond the cable modem, change by clicking on Back to switch to the back view as seen on the cable modem.

Later on click  on the Ethernet cable as found on the third switch port and then extend it to an open Ethernet LAN port on the router to link up the Home-PC down to the router.

Click also on the Ethernet cable as seen the third switch port and then take it also  to an open Ethernet LAN port as seen on the router to link up the second Home-PC to the router.

Then also click on the last Ethernet cable on the switch and extend (drag) it to the open Ethernet WAN port as seen on the router to link up the router to the internet service.

Then click the Ethernet cable on the cable modem and extend it to a single of the RJ45 ports that can be found by going to the wall plate.

Make sure to select the DC power connector that can be seen on the switch and extend it to the power port seen on the router so that one can plug in the router.

Looking at the Home-PC, select to view Windows 10 to see if the system is properly linked to the network and also the internet.

Go to the notification aspect and the select the Network icon and click on the tool called Open Network and Sharing Center.

Lastly, One can know if the connection to Home-PC2 is working by clicking on bench as seen in the top menu, and then select to see Windows 10 to know if it is well linked to the network and internet and also follow the notification steps above.

Learn more about  network components from

https://brainly.com/question/20535662

#SPJ4

How have cloud and 5g helped make extended reality (xr) technology more accessible to a wide audience?.

Answers

Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.

What is Cloud and 5G?

5G technology is bringing major improvements to the cloud computing. Most technology innovations can be more efficient when they are cloud-dependent. 5G makes communications more smoother and faster.

This activity is managed by the database management.

Thus, Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.

Learn more about Cloud and 5G.

https://brainly.com/question/11973901

#SPJ1

For array data that should be treated as a queue, the _____ method is used, which is similar to the pop() method except that it removes the first array item and not the last.

Answers

Answer:

shift()

Explanation:

what are trends in GPS ? ​

Answers

Answer:

New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.

Explanation:

Android os is developed by​

Answers

Answer:

It is developed by G oogle

Explanation:

Android os is developed by G oogle. It launched in 2008.

What are the real-life applications of coding? at least 5 to 6 lines anyone

Answers

The real-life applications of coding is that they are used in:

Traffic LightsCoffee Machines, etc.

What are useful applications of codes?

Coding is known to be a tool that helps to make  a composition of instructions that a computers needs to follow.

Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

the japanese call the practice of stopping production when a defect occurs

Answers

Answer:

Jidoka

Explanation:

hope this helps:)

Write a program that takes a 10-digit phone number and adds a hyphen in the correct location. Using an input field for the user to enter the information. Also, use a string for instructions on how to enter the phone in the input field.

Answers

The python program will request for a ten digit number from the user and formulate a real phone number from it.

How to write a python program to form a real phone number?

The program is written in python.

Therefore,

x = input("please write a ten digit number: ")

if len(x) == 10:

    a = f"({x[0:3]})"

    b = x[3:6]

    c = x[7:]

    print(a + " " + b + "-" + c)

Code explanation:The variable x is used to store the user's input.If the length of x is equals to 10, then we get the first three terms in bracket, the second three terms and the last 4 terms.Finally, we use delimiters to join the variables as required and print it out.  

learn more on python here: brainly.com/question/13462052

#SPJ1

Other Questions
bacteriumWhat caused the evolution of antibiotic-resistant bacteria? A client has had a kidney transplant performed for end-stage kidney disease. What type of immune response that T-cell lymphocytes perform is related to this type of surgery In a right triangle, a and b are the lengths of the legs and c is the lengthof the hypotenuse. If a = 2 feet and b = 1 foot, what is c? If necessary,round to the nearest tenth.c =feet Determine the angular velocity of the telescope as it orbits around the Sun. -William Shakespeare, Macbeth, Act I, Scene vii-What evidence from the text shows that Macbeth has finally decided to killthe king?O A. When we have mark'd with blood those sleepy two / Of his ownchamber and used their very daggersO B. Bring forth men-children only; / For thy undaunted mettle shouldcompose / Nothing but males.O C. I am settled, and bend up / Each corporal agent to this terriblefeat.O D. Who dares receive it other, / As we shall make our griefs andclamour roar / Upon his death? Dray collects marbles of different colour. 7/8 of his marbles are red. 2/9 of the remaining marbles are blue. How many marbles does he have in total, if the number of green marbles that he has is 14? a woman put her clothes in the dryer.There is a mix of wool and cotton. After the dryer is finished wool clothes and cotton clothes are stuck together. There's no wool stuck to wool or cotton stuck to cotton.using laws of charge, explain why this is the case Due to state constitutional amendments, the over 200 independent agencies, boards, and commissions created in Oklahoma are like a(n) The height of a cylindrical can is 4 7/16 inches and the radius is 3 inches. Which measurement is closest to the total surface area of the can in square inches?A)83.64 inB)55.96 inC)41.82 inD)140.19 in What happens when if you include too much information on a note card?It can make its meaning confusing.It can make it difficult to rearrange later.It can make it cluttered and hard to read quickly.All of these Please help need to get it done in 10 minutes.Thank youThere are 12 inches in a foot.Complete the table.Inches: 12, ___, 60, 108Feet: 1, 3, ___, ___ PLEASE HELP ! A helium balloon in a closed car occupies a volume of 2.32 L at 40.0oC. How many moles of helium would exert 5 atm of pressure at the ideal conditions above? The movement of African people from Central Africa republic in southern Africa 50 PTS SCIENCE Acting in the role of an atmospheric scientist, write a paragraph describing the atmosphere and its layers for a weather website entry. Be sure to describe significant similarities and differences among the different layers. Find the distance between points (3,6) and (9,2) Bacha discusses how news sources portray men, who are often in more confrontational and violent conflicts. Discuss why you think the media is more drawn to report confrontational or violent conflicts over nonviolent ones? Part AIn The Importance of Being Earnest which type of character is Cecily? I will mark brainiest to whoever gets it right.A. flatB. roundC. dynamicD. staticPart BWhat is Cecily's role in the play? A. She is complex and makes an impression on the reader.B. Her behavior changes by the end of the play.C. She one dimensional and helps develop the character of Algernon.D. She is the most undeveloped of all the characters. Ill give brainliest! I answered all of the previous questions, but I'm not sure I understand questions 4 and 5, so I'm hoping you can assist me.