answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
1 year ago
9

What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation

Computers and Technology
1 answer:
Vlada [557]1 year ago
5 0

Answer:

- limitation and control of network ports, protocols and services.

- Continuous vulnerability assessment and remediation.

Explanation:

The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.

The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.

You might be interested in
1⁰=?<br> Is equal to...........
Murrr4er [49]

Answer:

1

Explanation:

Anything to the 0th power is 1. However, 0⁰ is undefined.

5 0
2 years ago
Read 2 more answers
CHALLENGE ACTIVITY 2.9.1: Coordinate geometry. Determine the distance between points (x1, y1) and point (x2, y2), and assign the
Burka [1]

Answer:

<em>import java.util.Scanner;</em>

<em>public class TestClass {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner input = new Scanner(System.in);</em>

<em>        System.out.println("Enter value for x1, x2, y1, y2");</em>

<em>        double x1 = input.nextDouble();</em>

<em>        double x2 = input.nextDouble();</em>

<em>        double y1 = input.nextDouble();</em>

<em>        double y2 = input.nextDouble();</em>

<em>        double xVal = Math.pow((x2-x1),2);</em>

<em>        double yVal = Math.pow((y2-y1),2);</em>

<em>        double distance = Math.sqrt(xVal+yVal);</em>

<em>        System.out.println(distance);</em>

<em>    }</em>

<em>}</em>

Explanation:

The code is written in Java Programming Language.

This code simply implements the formula for the distance between two points given as

distance =\sqrt{(x2-x1)^{2}+(y2-y1)^{2}  )}

The scanner class is used to prompt and receive all the variables that are declared.

Note that we used two special Java methods (Math.pow and Math.sqrt)

7 0
2 years ago
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the messag
a_sh-v [17]

Answer:

Algorithm

Explanation:

Algorithm is a set of instructions designed to perform a specific task, an independent sequence of actions to be perform to solve a problem and instruction for performing a computation.

Algorithm is A(n) key set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes.

5 0
1 year ago
Read 2 more answers
You work for a shipping company and your manager receives orders from various customers everyday some existing ,some new .your m
Gennadij [26K]

Answer:

It's good to consider this as a dictionary, with key-value pair, or as a two-dimensional array.

And in the first case, the code will be as below:

day_i={'Bob':'100', 'Alice':'100','Celia':'110','Bob':'200'}

for k, v in day_i.items():

print(k, v)

Explanation:

The above code reads through each day, and each customer purchase amount in the form of Dictionary, and prints each customer name and purchase amount. And with little enhancement, we can create each day data, and print details of the day, as being asked by the user.

6 0
2 years ago
A restaurant manager wants to advertise that his lunch special offers enough choices to eat different meals every day of the yea
riadik2000 [5.3K]
2 to 12 options for each customer
6 0
1 year ago
Other questions:
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • Which task can a company perform with intranets?
    9·2 answers
  • Two career fields that lack minority professionals and thus offer many grant opportunities to students are education and _____.
    10·2 answers
  • A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3
    5·1 answer
  • Read first a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata to writ
    6·1 answer
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • The kings and queens of England are listed in a relation Kings(name,nickname,house,beginReign,endReign). Their name is unique, e
    8·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • Which of the following statements is incorrect? An operating system provides an environment for the execution of programs. An op
    15·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!