answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
2 years ago
14

What are the two behavior differences between Highlight Unused Rules and the Rule Usage Hit counter when a firewall is rebooted?

(Choose two.) A. Rule Usage Hit counter will not be reset B. Highlight Unused Rules will highlight all rules. C. Highlight Unused Rules will highlight zero rules. D. Rule Usage Hit counter will reset.
Computers and Technology
1 answer:
polet [3.4K]2 years ago
6 0

Answer:

A. Rule Usage Hit counter will not be reset B. Highlight Unused Rules will highlight all rules.

Explanation

1.Rule usage hit counter will not be reset because the rule usage track data that enables a person to view whether the rule pushed to firewalls in a device group has some traffic matches. The rule usage gives the information needed to determine whether a rule is effective for access and validate the rule additions and the changes in order to monitor the time frame when the rule was used.

2.Highlight Unused Rules will highlight all rules because the security rules is only based upon traffic logs by displaying the security policies that has not been unused from the time the device was boosted last making all the rules to be highlighted.

You might be interested in
Consider the following method, which is intended to return an array of integers that contains the elements of the parameter arr
Gennadij [26K]

Code:

public static int[] reverse(int [] arr){

Int [] newArr = new int[arr.length];

for (int k = 0; k<arr.length;k++){

/*Missing statement */

}

return newArr;

Answer:

Replace the comment with:

newArr[k] = arr[arr.length-k];

Explanation:

Required

Complete the code

In the given code:

The first line of the given code defines the method

public static int[] reverse(int [] arr){

The next line declares array newArr withe same length as array arr

Int [] newArr = new int[arr.length];

The next line iterates through the elements of array arr

for (int k = 0; k<arr.length;k++){

The /* Missing statement */ is then replaced with:

newArr[k] = arr[arr.length-k];

The above statement gets the elements of array arr in reversed order.

This is so because, as the iteration iterates through array arr in ascending order, arr.length-k gets the element in reversed order

6 0
2 years ago
Which of the following is considered technology?
nevsk [136]
A. computer
computer because computer is technology and pencil is not and spoon.
8 0
2 years ago
The population of town A is less than the population of town B. However, the population of town A is growing faster than the pop
defon

Answer:

#include<iostream>

using namespace std;

void main()

{

int townA_pop,townB_pop,count_years=1;

double rateA,rateB;

cout<<"please enter the population of town A"<<endl;

cin>>townA_pop;

cout<<"please enter the population of town B"<<endl;

cin>>townB_pop;

cout<<"please enter the grothw rate of town A"<<endl;

cin>>rateA;

cout<<"please enter the grothw rate of town B"<<endl;

cin>>rateB;

while(townA_pop < townB_pop)//IF town A pop is equal or greater than town B it will break

{

townA_pop = townA_pop +( townA_pop * (rateA /100) );

townB_pop = townB_pop +( townB_pop * (rateB /100) );

count_years++;

}

cout<<"after "<<count_years<<" of years the pop of town A will be graeter than or equal To the pop of town B"<<endl;

}

Explanation:

3 0
2 years ago
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon
Andru [333]

Answer:

d. Disable the account until the employee is ready to use it.

Explanation:

Inactive accounts usually presents vulnerability as they are readily compromised and act as targets for attacks by hackers or aggrieved ex-employees that were fired. Such accounts can be used to attack the system without anyone knowing or reporting suspected foul play since there's no one attached.

Since the user will be using the account in two weeks the best practice will be to disable the account until the employee is ready to use it.

8 0
2 years ago
Read 2 more answers
The alternative to encapsulating security protocol (esp) is _________.
Lina20 [59]
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
8 0
2 years ago
Other questions:
  • What is a typical grace period for a credit card...
    15·2 answers
  • How many frequencies does a full-duplex qam-64 modem use?
    8·2 answers
  • Lucas put a lot of thought into the design for his company's new white paper. He made sure to include repeating design elements
    13·2 answers
  • Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)
    12·1 answer
  • Janis needs to select all the text in a single bullet point. Which action describes the easiest method to perform this task?
    9·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
    8·2 answers
  • Write a program that replaces words in a sentence. The input begins with word replacement pairs (original and replacement). The
    11·1 answer
  • Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to
    11·1 answer
  • An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to
    5·1 answer
  • Calvin is an aspiring graphic designer. He wants to achieve Adobe Certified Expert certification in software that will be helpfu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!