you are an it director for a large school system. you need to set up inbound and outbound rules on the windows 10 machines. what will you use to accomplish this?

Answers

Answer 1

You will use to accomplish this Windows Defender Firewall with Advanced Security.

What aspect of Windows 10 makes configuration easier?Purview offers a sophisticated set of features while streamlining configuration setup. Regarding: Windows 10. MS Windows 11.GPO settings are updated more often by default on domain controllers—every 5 minutes. The GPO's Set Group Policy refresh interval for machines option is found in the Computer Configuration -> Administrative Templates -> System -> Group Policy section, where you may modify the GPO update frequency.A microprocessor called a Trusted Platform Module (TPM) is made to perform fundamental security-related tasks, mainly those requiring encryption keys. A hardware bus is used by the TPM to connect with the rest of the system after it has been placed on the motherboard of a computer.

To learn more about Windows Defender refer to:

https://brainly.com/question/29352945

#SPJ4


Related Questions

It is not important to type '=' before a formula or a function

Answers

Answer:

no

Explanation:

because it designates the sum or total

what are the three elements of protecting information

Answers

1. Confidentiality- preventing unauthorized access.
2. Integrity- maintaining accuracy and completeness.
3. Availability- ensuring access to authorized users.

What is Authorized users?

Authorized users are individuals who have been granted permission to access a system, network, or application. This usually involves the assignment of a user ID and password, or another type of authentication. Authorized users are typically employees, contractors, partners, or customers of an organization, who have a legitimate need to access the system or application. Access is typically granted on a need-to-know basis, and users are typically monitored to ensure they are using the system or application appropriately.

To know more about Authorized users
https://brainly.com/question/13615355
#SPJ4

you are purchasing a hard disk from an online retailer over the internet. what does your browser use to ensure that others cannot see your credit card number on the internet?

Answers

When a customer purchases a hard disk or any other item online, one of the primary concerns is the protection of sensitive information such as credit card details. To ensure this, internet browsers utilize a technology called Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols to encrypt the data transmitted between the customer and the server. This encryption process is often represented by a padlock symbol that appears in the address bar of the browser.
The SSL and TLS protocols work by using a complex system of public and private keys to scramble the data, which can only be unscrambled using the correct key. This ensures that the data cannot be accessed by any third party, and if it is intercepted by an unauthorized person, they will not be able to read it.

It is important for customers to also take steps to ensure their own safety when shopping online. This includes making sure that the website they are using is legitimate, checking for the padlock symbol and the "https" in the URL, using strong passwords, and keeping their software up-to-date. By taking these precautions, customers can minimize the risk of their sensitive information being compromised while shopping online.

To know more about  customer visit:

https://brainly.com/question/31192428

#SPJ11

Wires,plugs,speakers, chis are all examples of what

Answers

Answer:

Ch1kenT3nders

Explanation:

What is the definition of Overflow Error?

Answers

An overflow error occurs when you try to create an assignment that is too much for the limitations of the target of the assignment.

You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and csmsales.local. You want the DNS servers in each domain to be able to handle DNS queries from client computers for any of the other domains. DNS servers in the csmtech.local and csmpub.local domains should be authoritative for their own domains and the csmsales.local domain. However, DNS servers in csmsales. local should be authoritative only for csmsales.local. How should you set up the DNS servers and zones to handle this situation? Explain how the DNS servers in each domain should be configured with zones. Be sure to include information about replication scope and zone types.

Answers

Answer:

ecognize a statistical question as one that anticipates variability in the data related to the ... right now?” a) The ... c) This is not a statistical question because there ... predicted that more people sent 80 to 99 emails than 0 to 19 emails per week. Complete the histogram to represent the data. Is Lisa's prediction valid?

Explanation:

What is the default extension of Q Basic program file? ​

Answers

Answer:

Bas

Files written with QBASIC must be run using the program and have the "bas" file extension.

Hope this helps

#Carryonlearning

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

text designation of the location of a file or subdirectory in a file system is called

Answers

The text designation of the location of a file or subdirectory in a file system is called a "file path" or "path."

The text designation of the location of a file or subdirectory in a file system is called a file path. This is the series of folders and directories that need to be navigated through to find a specific file or subdirectory. The file path includes the names of each folder and directory separated by slashes, and it can also include the name of the file itself. This content loaded text designation is essential for finding and accessing specific files and folders within a computer's file system. A subdirectory is a type of website hierarchy under a root domain that uses folders to organize content on a website. A subdirectory is the same as a subfolder and the names can be used interchangeably.

learn more about subdirectory here:

https://brainly.com/question/29360568

#SPJ11

Which situations are a good fit for using telehealth? Select 4 options.
A. You need an appointment to get tested for allergies.
B. You doctor sends you an email to remind you about an appointment.
C. You had a car wreck.
D. Your doctor emails you because your heart monitor shows an abnormality.
E. You need a referral to a skin doctor.

Answers

Answer:

A, B, C and E

Here, hope this helps...... ;)

Explain the acronym STRIDE as used in assessing threat modelling techniques [5 Marks] b) Describe the two main types of vulnerability in relation to privilege escalation stating an example cach? [6 Marks] c) Differentiate between cross-site scripting and cross-site request forgery? 14 Marks] d) Discuss how one can prevent cross-site request forgery [2 marks] e) What are the implications of Injection flaws? [3 Marks A3. a) Describe the concept of missing function level access control and its implications? 13 Marks] b) Explain four (4) ways of fixing a weak authentication session [4 Marks] c) Discuss sensitive data exposure vulnerability and its implication in web applications. 15 Marks] d) Outline five ways of preventing an attacker from exploiting a web application through sensitive data exposure. 15 Marks] e) Link injection facilitates CSRF. What is Link injection and how can it be avoided. [3 marks] A4. a) With the aid of a diagram, explain the cross site scripting exploit process. 15 Marks] b) Discuss five ways an administrator would prevent session hijacking in developing a web application. (5 Marks] c) Outline five (5) implications of vulnerabilities due to insecure direct object reference. [5 Marks] d) Explain five ways one can prevent insecure direct object reference vulnerability?

Answers

a) STRIDE is an acronym used in threat modeling techniques

b) The two main types of vulnerabilities in relation to privilege escalation are vertical privilege escalation.

c) Cross-Site Scripting (XSS) - inject malicious scripts

a) STRIDE is an acronym used in threat modeling techniques to categorize common threat types. Each letter represents a different type of threat: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

b) The two main types of vulnerabilities in relation to privilege escalation are vertical privilege escalation, where an attacker tries to elevate their privileges within the same user hierarchy, and horizontal privilege escalation, where an attacker aims to gain the same level of privileges as another user.

c) Cross-Site Scripting (XSS) is a vulnerability where attackers inject malicious scripts into a web application, while Cross-Site Request Forgery (CSRF) involves tricking a victim into performing unintended actions on a web application in which they are authenticated.

d) To prevent Cross-Site Request Forgery (CSRF), measures such as using CSRF tokens, implementing SameSite cookies, employing anti-CSRF frameworks, implementing request validation, and educating users about safe browsing habits can be effective.

e) Injection flaws in web applications can result in unauthorized data access, data manipulation, system compromise, data loss or exposure, and damage to an organization's reputation. Robust input validation, parameterized queries, and other security measures are necessary to mitigate injection flaws.

Learn more about Cross-Site Scripting here:

https://brainly.com/question/30893662

#SPJ4

why is what you say in business as important as how you say it

Answers

Answer:

Because the things you say and how you say it can determine whether or not you sell an item, make a deal with another company and things of that nature.  Hope this helps!!

Because you have to be taken serious in business so that’s how it’s different

what is the best definition of the word app?

Answers

an application, especially as downloaded by a user to a mobile device.

(If this is what you mean by app)

Answer:

Software designed to run on computers and other devicesA

Explanation:

for Jenny's personal computer?
id videos. Which operating
system would be appropriate Jenny's needs to buy a computer to create word documents, make presentations, listen to music, and watch movies and videos.
OA. UNIX
O B. Linux
O C. Microsoft Windows
O D. MS-DOS

Answers

Answer: C

Explanation: Microsoft Windows would be the most viable option here because UNIX and Linux are used for server-side applications, and MS-DOS is an old operating system which is not supported anymore. There is also the Microsoft 365 suite on Microsoft Windows, which can allow Jenny to make presentations using powerpoint, and edit videos.

Write a class RangeInput that allows users to enter a value within a range of values that

is provided in the constructor. An example would be a temperature control switch in

a car that allows inputs between 60 and 80 degrees Fahrenheit. The input control has

"up" and "down" buttons. Provide up and down methods to change the current value.

The initial value is the midpoint between the limits. As with the preceding exercises,

use Math. Min and Math. Max to limit the value. Write a sample program that simulates

clicks on controls for the passenger and driver seats

Answers

Answer:

UHHHM

Explanation:

capitalization, or lack thereof, makes no difference with unix and linux commands.

Answers

Capitalization, or the lack thereof, does indeed make a difference when dealing with Unix and Linux commands. In these operating systems, commands are case-sensitive, which means that the system will treat commands differently based on their capitalization.

For example, the command "ls" (list directory contents) would work as expected, but "LS" or "Ls" would not be recognized as the same command. This case sensitivity extends to command options, arguments, and file names as well.This case-sensitive nature of Unix and Linux is designed for precision and to avoid potential errors caused by confusing similarly named commands or files. It ensures that users must enter the exact command or file name to avoid any unintended consequences.It is essential for users to pay attention to capitalization when working with these operating systems to avoid potential issues or incorrect command execution. Familiarizing oneself with the correct capitalization of commonly used commands and file names can save time and prevent mistakes in the long run.
In summary, capitalization matters in Unix and Linux commands as they are case-sensitive. Proper attention to capitalization ensures the correct execution of commands and prevents potential errors caused by using similar but differently capitalized commands or file names.

Learn more about Linux here

https://brainly.com/question/25480553

#SPJ11

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

Answers

Computers that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and understood.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).

In Computer networking, all computers and other network devices that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and well understood by end users.

Read more on protocol here: https://brainly.com/question/17387945

karel is conducting a penetration test on codehs and is having trouble finding a weakness. suddenly, she discovers that the server of a codehs partner - code with karel - can be breached. once karel has gotten access to the code with karel server, she can then access the codehs servers. what tactic is karel using?

Answers

The tactic Karel is using is commonly known as "lateral movement."

Lateral movement refers to the process of an attacker gaining access to one system or network and then using that initial foothold to move laterally and gain access to other systems or networks within the same environment. In this scenario, Karel initially discovers a weakness in the server of a CodeHS partner, specifically the "code with Karel" server. By exploiting this vulnerability, Karel gains unauthorized access to the code with Karel server. Once Karel has access to this server, she realizes that she can leverage this access to breach the CodeHS servers as well. By moving laterally from one compromised server to another, Karel is extending her reach and increasing her control within the overall system. This tactic allows her to potentially escalate privileges, access sensitive information, or conduct further attacks on the compromised network.

Learn more about lateral movement here : brainly.com/question/13839893
#SPJ11

What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6

Answers

Answer:

A math.pow reference

Explanation:

Answer:

from math import ceil

Explanation:

yes

a database company is working on a natural-language processing (nlp) system. it divides the tasks into two activities. the activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content. question 8 options: interfacing knowledge acquisition analysis data warehousing

Answers

The two activities involved in the natural-language processing (NLP) system developed by a database company are: Interfacing and Analysis

Natural Language Processing (NLP) is an area of artificial intelligence concerned with the interactions between computers and humans using natural language. The two activities involved in the NLP system developed by a database company are as follows:

Interfacing: It is the activity that involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content.

Analysis: It is the activity that involves processing the information and carrying out further operations as required. It involves a lot of data processing and analysis to be able to generate useful information from the input text.

Learn more about  natural language processing (NLP) systems:https://brainly.com/question/14222695

#SPJ11

? Assessment
8/10
Which of the following products likely include Internet of Things (IoT) connected
devices?
A soap dispenser that dispenses soap
when it detects a hand underneath.
A smart toilet flushes automatically
after use.
Lights that turn on when someone
enters the bathroom.
None of the above

Answers

Answer:

none of the above

Explanation:

Quick question if anyone knows? How do you give brainlist? Please tell me if you know! ( Here if a chiaki gif for your too lol )

Quick question if anyone knows? How do you give brainlist? Please tell me if you know! ( Here if a chiaki

Answers

Answer:

To give brainliest you need to click the little crown under the answer that someone has responded with! it should be located near the rate 5 stars!

Explanation:

hopefully this helps!! also yes yes ty for the gif<3

The database of viruses that an antivirus software scans for is called​

Answers

Answer:

The anti virus scanner is the answer.

Utilities are specialized programs that help the operating system function more efficiently. they are essential for computer maintenance and some come built-in to the operating system. True or false

Answers

Utilities are specialized programs that are often built-in in computers to provide support to the operating system to function more efficiently and are crucial for computer maintenance. Thus, the given statement is true.

Utility programs are system software that perform specific functions to maintain proper working of computers in an efficient way. Utility programs optimize computers performance by analyzing and managing tasks and resources of operating systems to handle different situations.

Utility programs are often pre-installed with operating systems as well as a large variety of utility programs are available on the internet for downloading or purchasing that facilitate operating systems in multiple ways.

Certain common tasks of utility programs include installation and uninstallation, virus detection, data backup and restore, deletion of unwanted files, task scheduling, and disk fragmentation.

Some examples of utility programs are disk management tools, backup software, file management tools, compression tools, and antivirus software.

You can learn more about utility programs at

https://brainly.com/question/22247778

#SPJ4

What is a hole note in word form

Answers

whole note is the answer

Answer:

4 beats

Explanation:

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

(ONLY ANSWER IF YOU KNOW) So I want to play call of duty MW on my my pc to my 4k 120hz tv using a hdmi cable, do i just need any type of hdmi cable or do i need to get a 4k 120hz hdmi cable? I don't know how I'd do that exactly. In other words, how do i use my TV as my MONITOR for my pc to play games. I'd assume that you use a hdmi cable like plugging in a xbox or playstation. thanks, Rodger! :)

Answers

hi mate, not an expert on this but you would need a standard hdmi cable 4k 120hz as then the right power supply would be going through because as i’m sure you know pcs and tvs work differently. sorry if that doesn’t make sense but i hope it does :)

what's my favorite color

black

red

purple

yellow

orange

Answers

Answer:

.

Explanation:

er reports that he is having problems with his monitor. He explains that his laptop's liquid crystal display (LCD) is no longer spreading the light over the entire screen. Which component of the LCD is most likely causing this problem?

Answers

Answer:

diffuser

Explanation:

Based on the scenario being described, the most likely cause of the problem is a bad diffuser. This is a component found in nearly every type of LCD backlit displays and are used to produce an even array of lighting across the entire display. If this component fails then it will cause bright spots and dim spots throughout the display, similar to what the client is reporting in this scenario since the light is not being evenly distributed.

which sorting algorithm has the best asymptotic runtime complexity?

Answers

The sorting algorithm with the best asymptotic runtime complexity is O(n log n), which is the average and worst-case time complexity of comparison-based sorting algorithms such as Merge Sort and Heap Sort. Other sorting algorithms such as Bucket Sort and Radix Sort have a time complexity of O(n) but they have certain limitations and are not as widely used.

Asymptotic runtime complexity refers to the amount of time that an algorithm takes to complete as the input size grows indefinitely. It is typically represented using big O notation, which describes the upper bound of the growth of the algorithm's running time.

The most common time complexities are:

O(1), which means the algorithm takes constant time regardless of the input size.O(n), which means the algorithm's running time is directly proportional to the input size.O(n log n), which means the algorithm's running time increases logarithmically with the input size.

Learn more about algorithm, here https://brainly.com/question/22984934

#SPJ4

Other Questions
a man is cooking rice by burning wood in the stove what are the thermal and heat absorbing chemical reaction here? Show that or obtain expression for Corr(y t,y t+h)= Judy and Yvette recently inherited some vacant land from their grandfather. The land is close to a growing city. They are emotionally attached to the land (they used to have picnics on it as a family) and decide to hold onto the land and sell it later. In the meantime, they agree to split expenses, such as council charges and liabilityinsurance. Do Judy and Yvette become partners concerning this project? Would your analysis of the facts cited above differ if Judy and Yvette decide to increase the value of their land by subdividing it, installing a sewer, providing electricity, waterand streets? O'Reilly's Restaurant has advertised an opening for a cashier. The hours listed are Monday, Tuesday, and Friday from 4 to 10 p.m. The job pays $7.58 an hour.How much is this per week?$181.92$136.44$113.70$45.48 When hydrogen is fused into helium, energy is released from Choose one: A. the increase in pressure. B. the decrease in the gravitational field. C. conversion of mass to energy. D. gravitational collapse. A seventh-grade class sells gift cards as a fundraiser for the school library. Each gift card sells for $15.00. The library gets 35% of the money earned for each gift card sold. How much money does the library get if the class sells 500 gift cards? solve the simultaneous equations on paper write down the coordinates of the points where the two graphs meet y=x^2+19x+49y=5x+4 3y - 21 = 12xHelp please 2. A sample containing 1.80 mol of argon gas has a volume of 10.00 L. What isthe new volume of the gas, in litres, when each of the following changes occurs inthe quantity of the gas? Assume that pressure and temperature remain constant.The changes are not cumulative. T(a) An additional 1.80 mol of argon gas is added to the container. [ans: 20.0 L](b) A sample of 25.0 g of argon gas is added to the container. [ans: 13.5 LJ(c) A hole in the container allows half of the gas to escape. [ans: 5.00 L]3. A balloon that contains 4.80 g of carbon dioxide gas has a volume of 12.0 L. Assumethat the pressure and temperature of the balloon remain constant. What is the newvolume of the balloon if an additional 0.50 mol of CO is added? [ans: 67 L] How would Darwins explanation of long necks in giraffes differ from Jean Baptiste Lamarcks explanation of the same trait? An angle measures 64.8 less than the measure of its complementary angle. What is the measure of each angle? What is 418.000,00 in Spanish vocabulary ? Attempt justification of the title of Neto's poem in relation to its content. how many uique values of x solve x^3 + 12x^2 + 36x=0?N = ____ This painting was a catalyst for the ____ movement in art. a. cubist b. futurist c. surrealist d. dadaist A measurement is considered ________if it actually measures what it is intended to measure Activity Based Cost systems identify and measure cost consumption by the different activities performed in a production process which allows managers to understand and help control product costs.TrueFalse On a coordinate plane, 2 lines are shown. The first dashed straight line has a positive slope and goes through (negative 1, 0) and (0, 2). Everything to the right of the line is shaded. The second solid straight line has a positive slope and goes through (0, negative 1) and (1, 1). Everything to the left of the line is shaded. Which equation represents an inequality in the system of inequalities shown in the graph? Which point is a solution to the system? the earth's interior structure's and the layer's of earth A city has a population of 435,000. The population y increases by 5% each year. a. Write an exponential function that represents the population after t years.b. What will the population be after 11 years? Round your answer to the nearest thousand.show work pleaseee