Two of the most popular web servers are Apache and Microsoft IIS. Discuss some of the tools and techniques used to secure these web servers.

Answers

Answer 1

Answer:

Answered below

Explanation:

Various tools and techniques are used to secure web servers and they include;

- Network firewalls which are systems used to prevent unauthorized access to a server from external networks.

- Antiphishing tools used to prevent phishing.

- Encryption tools which use cryptography to encode sensitive data.

- Penetration testing softwares are used to test the vulnerability of network security.

- Antivirus softwares.


Related Questions

What is the importance of internet safety?

Answers

Answer:

1. Identity theft

2. Safety for you and your family and personal info

3. Harrasement and bullying prevention

Some things never to share on the internet with strangers...

1. Full name

2. Birthday

3. State or city of home

4. Pictures of yourself

5. Personal info about you or your family members

6. Personal social media links and tags

Explanation:

hOPE THIS HELPS!! I think some people need a reminder of this sometimes! you didnt give any options so i hope this helps you!

Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.

Answers

Answer:

int miles[4] = {1, 5, 9, 22};

Explanation:

Given:

Initialized values = 1, 5, 9, and 22

Find:

Defines an array of four integers

Computation:

int miles[4] = {1, 5, 9, 22};

why am I doing the investigation?​

Answers

Answer:

What do you mean

Explanation:

Answer:

Because you like to

Explanation:

how do i install glastopf on a windows computer using python and MySQL?

Answers

Explanation:

Connecting to MySQL using Python

Before you can access MySQL databases using Python, you must install one (or more) of the following packages in a virtual environment:

mysqlclient: This package contains the MySQLdb module. It is written in C, and is one of the most commonly used Python packages for MySQL.

mysql-connector-python: This package contains the mysql.connector module. It is written entirely in Python.

PyMySQL: This package contains the pymysql module. It is written entirely in Python.

All three of these packages use Python's portable SQL database API. This means that if you switch from one module to another, you can reuse almost all of your existing code (the code sample below demonstrates how to do this).

Setting up the Python virtual environment and installing a MySQL package

To set up the Python virtual environment and install a MySQL package, follow these steps:

Log in to your account using SSH.

To create a virtual environment, type the following commands:

who here has a crush on jk from bts but feels more mature than him

Answers

Answer:

Nope not K-pop fan

Explanation:

Tools is used to collect the animal manure from the grounds

Answers

Answer:

The options are

A. bolo. B. hole C. rake. D. shovel.

The answer is D. Shovel

Explanation:

The most suitable option is a Shovel which can be used to collect the animal manure from the grounds.

Using a shovel will make the job easier as a result of its very firm handle to lift the manure appropriately and also the curved base to enable proper transfer of the manure from the soil to where it’s needed.

The name of the tool which is used to collect the animal manure from the grounds is:

D. Shovel

According to the complete question, we can see that there are a variety of options to select from that would be most suitable for a farmer to collect manure from the ground.

As a result of this, the name of the farm tool which is used to collect animal manure from the grounds is a shovel.

This is because, a shovel has a long handle and a curved base which can be used to pack things off the ground and it is especially useful in the farm when packing animal manure.  

Therefore, the correct answer is option D

Read more here:

https://brainly.com/question/22488611

Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't work as well for travelling employees in locations with unreliable or no internet access. What steps could remote users take to keep access to important folders on the road?

Answers

Explanation:

Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.

Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.

What is the best definition of a network?

Answers

Answer:

like tv or wifi

Explanation:

A technology or a computer or a phone !

On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing

Answers

Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
Absolutely c is the correct!

Three of the following values could be stored as strings. When would you NOT use a string command? O To store a word. O To store values NOT used for calculations. O To store decimal values. O To store a list of colors.​

Answers

Answer:

To store decimal values

Explanation:

Decimal values are considered a float data type, not a string, so if the question is asking for the only thing that couldn't be stored as a string, it would be a decimal value.

Decimals can be stored as a string in certain situations, but it would have no value in a mathematical equation.

What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity

Answers

Answer:

Size

Explanation:

thats it thats the answer

please tell fast plzzzzzzz​

Answers

Answer:

True

Explanation:

I just check on my computer

Answer:

True

Explanation:

u use this to do the symbols liek the at symbole or dollar sign.  just to name a few

Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter. Sample output with inputs 2014 777: Dog license: 77702014

Answers

Answer:

Written in Python:

def licenseNum(licenseYear, customID):

    output = 100000 * customID + licenseYear

    print("Dog license: "+str(output))

 

Explanation:

This line defines the function with parameters licenseYear and customID

def licenseNum(licenseYear, customID):

This calculates the output as stated in the question

    output = 100000 * customID + licenseYear

This displays the output

    print("Dog license: "+str(output))

To call the function, make use of: licenseNum(2014, 777)

Where 2014 and 777 can be replaced with other digits as required

Answer: C++

void DogLicense:: CreateLicenseNum(int customID)   {

 

  licenseNum = (100000* customID) + licenseYear;

 

  return;

}

Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
a. 228 = 268 subnets, 24 -2 = 14 hosts per subnetwork
b. 24 = 16 subnets, 228 - 2 = 268E6 hosts per subnetwork
c. 24 - 2 = 14 subnets, 24 = 16 hosts per subnetwork
d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Answers

Answer:

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Explanation:

When four bits are borrowed from the fourth octet of class C IP address 200.245.10.150, the IP address is subnetted to 16 subnets, where the number of subnets is equal to two raised to the number of borrowed bits (ie, 2^ number of borrowed bits), and 14 assignable host IP address gotten from the formula;

  = 2^(number of host bits in the fourth octet) - 2

  = (2^4) - 2

  = 16 - 2 = 14 host addresses

Deb needs to add borders on the cells and around the table she has inserted into her Word document.




Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group

Answers

Answer:

Design tab

Explanation:

Select the call or table that you will like to useThen select the design tabIn the group page background select Page Borders There you will have multiple choses for where you want your borderYou can even customize your border by pressing Custom Border at the bottom of the list for Page Borders

Answer:

Table tools design contextual tab

Explanation:

Write a nested loop that prints the following output.
1
1 2 1
1 2 4 2 1
1 2 4 8 4 2 1
1 2 4 8 16 8 4 2 1
1 2 4 8 16 32 16 8 4 2 1
1 2 4 8 16 32 64 32 16 8 4 2 1
1 2 4 8 16 32 64 128 64 32 16 8 4 2 1

Answers

Answer:

Written in Python:

rows = 8

for i in range(1,rows+1):

      for j in range(1,rows):

             print(" ")

      x = 1

      for j in range(1,i):

             print(str(x)+" ",end='')

             x = int(x*2)

      while x >= 1:

             print(str(x)+" ",end='')

             x = int(x/2)

Explanation:

For each row, the print out is divided into two parts.

1. Starts from 1 and ascends to a peak

2. Then descends from the peak to 1

This line initializes the number of rows to 0

rows = 8

This iterates from 1 to the number of rows

for i in range(1,rows+1):

This prints a blank at the end of sequence printed on each line

      for j in range(1,rows):

             print(" ")

This initializes each row element to 1

      x = 1

This iterates the number of item to print on each line depending on the row

      for j in range(1,i):

This prints the row element in ascending order to the peak

             print(str(x)+" ",end='')

This calculates the next element to be printed

             x = int(x*2)

This checks for valid row element to print in descending order to 1

      while x >= 1:

             print(str(x)+" ",end='')

             x = int(x/2)

A network technician has made a UTP cable that is terminated as T586A on one end and T586B on the opposite end. What type of cable has been constructed?

Answers

Answer:

CROSSOVER CABLE

Explanation:

Crossover Cable is used to connect same types of device.

Crossover Cable is very similar to straight-through, except that they have pair of

wires that crisscross. This allows the two devices to communicate at the same

time.

TIA/EIA 568A: White/Green-Green, White/Orange-Blue, White/Blue-Orange,

White/Brown-Brown

TIA/EIA 568B: White/Orange-Orange, White/Green-Blue, White/Blue-Green,

White/Brown-Brown

Write a statement that takes a variable named open_file that contains a file object and reads the next 12 characters into a variable named description.

Answers

Answer:

description=open_file.read(12)

Explanation:

A programming language in computer is a set formal languages that comprises a set of instruction which produce various kinds of output. It is used ti implement algorithms in computer programming.

In the context,  description=open_file.read(12) is the statement given to the computer as input which takes a variable named as open_file containing a file object and which reads the next 12 characters into the variable named as description.

In a network that uses distance-vector routing protocols, what information is included in the update sent out by each router?

Answers

Answer:

Network or next hop associations

Explanation:

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is "network or next hop associations."

This information is contained in a routing table. It commands a router on which destination is most favorable. It is done by carrying the packet to a certain router that indicates the next hop along the way to the last destination.

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is the network or next hop association.

A distance-vector routing protocol in data networks is vital for determining the best route for the packets that are based on the distance.

It should be noted that distance-vector routing protocol simply measures the distance based on the number of routers that a packet will have to pass. The information that is vital will be the network or next hop association.

Read related link on:

https://brainly.com/question/20595433

please choose odd one out please tell fast ​

Answers

Answer:

cpu

Explanation:

Answer:

CPU bc A-Z is the first to the last also with the one digit numbers 0-9 so there for there is  no connection with CPU as the other ones.

Explanation:

Hoped I helped have an amazing day. Please consider marking this brainliest thank you in advanced if you do!

Write the interface (.h file) of a class Player containing: A data member name of type string. A data member score of type int.A member function called setName that accepts a parameter and assigns it to name . The function returns no value.
A member function called setScore that accepts a parameter and assigns it to score . The function returns no value.
A member function called getName that accepts no parameters and returns the value of name .
A member function called getScore that accepts no parameters and returns the value of score .
My start code:
class Player
{
string name;
int score;
void setScore (int playerScore)
{
score = playerScore;
}
int getScore()
{
return score;
}
}

Answers

Answer:

Following are the class definition to this question:

class Player//defining a Player class  

{

private://use access specifier

string name;//defining string variable  

int score;//defining integer variabl  

public://use access specifier

void setName(string par_name);//declaring the setName method with one string parameter

void setScore(int par_score);//declaring the setScore method with one integer parameter

string getName();//declaring string method getName

int getScore();//declaring integer method getScore

};

Explanation:

In the above-given code, a Player class is defined, that hold a method and the variable which can be defined as follows:

It uses two access specifier, that are public and private. In private, a string and an integer variable "name, score" is declared, which holds their respective value. In public, it declares the get and set method, which holds the value from its parameters.

Read a list of PowerPoint tasks.

Creating a new presentation
Opening a saved presentation
Printing a presentation
Saving a presentation

Which parts of PowerPoint can help to complete all the tasks on the list? Check all that apply.

ribbon
Status bar
Backstage view
Windows control
Quick Access toolbar

Answers

Answer:

ribbon

Backstage view

Quick Access toolbar

Explanation:

please choose odd one out please tell fast​

Answers

Answer: arrow key

Explanation:

The the concept of plug-and-play is demonstrated by which of the following scenarios

Answers

Answer:

What are the Scenarios

I will update this when you give us them

Explanation:

Answer: Farrah has completed a post-secondary education program and is now ready to begin working, without additional training, on her first day.

Explanation:

The literals in the following statement are Blank 1 and Blank 2.
a = 3.14*r*r/2;

Answers

The awancer is 5.856 because you to the math and militarily

Using the constant, declare a 1D array to store 10 integers ii. Write a loop that fills the array with 10 random numbers g

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

#include <cstdlib>//defining header file

using namespace std;

int main()//defining main method

{

const int ax[10]={1,2,3,4,5,6,7,8,9,10};//defining a const array ax that store 10 numbers

int r_num[10];//defining an array r_num

int i;//defining integer variable

for(i=0;i<10;i++)//defining for loop to calculate and store random numbers in array

{

   r_num[i]=rand()%100; //use rand function to store value in array

}

cout<<"Elements of the array that stores 10 random numbers: "<<endl;//print message

for(i=0;i<10;i++)//defining for loop for print array value

{

   cout<<r_num[i]<<endl;//print array value

}

return 0;

}

Output:

Elements of the array that stores 10 random numbers:  

83

86

77

15

93

35

86

92

49

21

Explanation:

In the above-given program, two arrays "ax, and r_num" is declared that store value in it, in which the ax array use the const keyword and in the r_num it uses the loop and random function which can be defined as follows:

In the second array "r_num", two for loop is declared, in which the first loop uses the rand function to store value in the array, and in the second array, it prints the value of the array.

Stacy is generating a report for her database. Which of these statements is true about her database reports?
OA. To generate a report will include all her records in her database
OB. The generator report will include all records that a query fetches
OC. Once you generate a report she cannot edit it
OD. A report in itself another database on which she can run queries

Answers

The answer is OB. The generated report will include all records that a query fetches.

Create a query that shows columns employee last name, job title and hire date for those employees who joined the company on or after the first day of December 2016. Do not display job title of stock clerk. Show records in descending order by job title (Z to A).

Answers

Answer:

SELECT last_name, job_title, hire_date FROM employee WHERE hire_date>="01-12-2016" AND job_title != "STOCK CLERK" ORDER BY job_title DESC;

Explanation:

The SQL code queries the employee table returning records of the last_name, job_title, and hire_date columns matching the employees hired on or after December 2016 and job titles that are not stock clerks in the employee table.

The WHERE and AND clause is responsible for the condition while the ORDER BY clause returns the query result in the of the job title in descending order.

ATTENTION MODERATORS

User "69PierNeedsAnswers69" has been spamming the same message on multiple questions, likely point farming. I request that you time him out as soon as possible.

Link to his profile: https://brainly.com/app/profile/27562423

Answers

Answer: lol

Explanation:

please complete the spelling please tell fast.​

Answers

Answer:

spacebar and number i think

Explanation:

Answer:

b)ans might be number.........

Other Questions
In 23 complete sentences, thoroughly explain the protagonist's main motivation or goal in your Module One short story? What does the protagonist want? Provide at least two specific details from the text to support your analysis of the protagonist's motivation or goal.Condensed milk- If you don't know pls don't answer cause i really need help Which lines from the passages do NOT support the theme of man'sability to self-govern? During a tug of war competition neither team was able to gain an advantage which of the following explains the force is this situation The cardiovascular system, which transports blood through the body, is a one-way system. Write a nested loop that prints the following output. 1 1 2 1 1 2 4 2 1 1 2 4 8 4 2 1 1 2 4 8 16 8 4 2 1 1 2 4 8 16 32 16 8 4 2 1 1 2 4 8 16 32 64 32 16 8 4 2 11 2 4 8 16 32 64 128 64 32 16 8 4 2 1 can someone please help me on this About how much greater is the gravitational force exerted by the moon on the near side of the earth than on the far side? Choose one of the Following:(a) About 2% greater(b) About 7% greater(c) About 11% greater(d) About 15% greater what is the realashionship between ceels and tissues Who volunteers as Tribute for the girl in question #1? Can the energy in sunlight be converted to C,H, or O atoms? Solve for N2/9n= 6 [tex]6 \div 3 + {9}^{2} - 4[/tex]evaluate the following expression I think of a number multiply by 2 then subtract 9 The element with 8 valence electrons and 5 energy levels. The sales level that results in a project's net income exactly equaling zero is called the _____ break-even.A) operationalB) leveragedC) accountingD) cashE) present value What inference about women in this culture can be made from the excerpt?Historically, women in this culture were expected to be athletic.Historically, women in this culture had difficultly making decisions.Historically, women in this culture did not participate in sports.Historically, women in this culture did not spend holidays in the South. What is a characteristic of high-level languages?A. They have the fastest execution speed on computer processorsB. They use unfamiliar English words to describe instructions and memory locations.C. They expect programmers to be familiar with computer architecture.D. They use mathematical symbols such as + and - to denote addition and subtraction operations. A band is playing at an auditorium with floor seats and balcony seats. The band wants to sell the floor tickets for $15 each and balcony tickets for $12 each. They want to make at least $3,000 in ticket sales. What's on your Christmas List? Santas Listening~ Chapter 4: Painted Faces and Long Hair 1. Examine Simons actions in this chapter and compare them to Rogers. Both boys are outsiders like Piggy, yet seem to be accepted. Based upon these observations, present an argument for whom they will eventually ally themselves and explain why.