what prevents firewall filtering? group of answer choices encryption session length remote access authentication

Answers

Answer 1

Firewall filtering can be hindered by encryption. Encryption is a process that encodes data, making it unreadable to unauthorized users.

When data is encrypted, firewalls may have difficulty inspecting the content and determining whether it complies with the security policies. This can lead to challenges in filtering out malicious or unwanted traffic.Remote access authentication, on the other hand, is a process that verifies the identity of users accessing a network or system remotely. While it is an essential security measure, it does not directly impact firewall filtering.Session length refers to the duration of a user's connection to a network or system. It is not directly related to the effectiveness of firewall filtering either.Encryption can prevent effective firewall filtering by obscuring data, making it difficult for firewalls to inspect and filter traffic. Remote access authentication and session length are important security aspects but do not directly influence firewall filtering.

For such more questions on Firewall filtering

https://brainly.com/question/31480183

#SPJ11

Answer 2

encryption, Firewall filtering can be hindered by encryption. Encryption is a process that encodes data, making it unreadable to unauthorized users.

When data is encrypted, firewalls may have difficulty inspecting the content and determining whether it complies with the security policies. This can lead to challenges in filtering out malicious or unwanted traffic.

Remote access authentication, on the other hand, is a process that verifies the identity of users accessing a network or system remotely. While it is an essential security measure, it does not directly impact firewall filtering.

Session length refers to the duration of a user's connection to a network or system. It is not directly related to the effectiveness of firewall filtering either.

Encryption can prevent effective firewall filtering by obscuring data, making it difficult for firewalls to inspect and filter traffic. Remote access authentication and session length are important security aspects but do not directly influence firewall filtering.

learn more about firewall here:

https://brainly.com/question/13098598

#SPJ11


Related Questions

write a function that accepts an array of numbers as an argument and returns their average. 2. write a function that accepts an array of numbers as an argument and returns the largest number in the array

Answers

The above program defines two functions, one to find the average of an array of numbers and the other to find the largest number in an array of numbers.

Write a function that accepts an array of numbers, arguments and, returns their average and largest number?

1. Function to find the average of an array of numbers function findAverage(arr) {let sum = 0;for(let i = 0; i < arr.length; i++) {sum += arr[i];}let avg = sum/arr.length;return avg;}// calling the function with an array of numbersconsole.log(findAverage([1, 2, 3, 4, 5])); // output: 3 // 2. Function to find the largest number in an arrayfunction findLargestNumber(arr) {let largest = arr[0];for(let i = 1; i < arr.length; i++) {if(arr[i] > largest) {largest = arr[i];}}return largest;}// calling the function with an array of numbersconsole.log(findLargestNumber([1, 2, 3, 4, 5])); // output: 5

Learn more about the Function of an array

brainly.com/question/13543316

#SPJ11

Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?
A. Children's Online Privacy Protection Act
B. Electronic Communications Privacy Act
C. California Online Privacy Protection Act
D. Online Data Security Act

Answers

Answer: B. Electronic Communications Privacy Act

Explanation: If you look up what  Electronic Communications Privacy Act it tells you the answer in the meaning or definition. Therefore Electronic Communications Privacy Act is the correct answer. Please rate me a 5/5. Your welcome.

HELP NOW ASAP NOW!!!!!

Jenae is helping her dad create a blog for his garden club. Which tool will she use?
CSS
Web browser
JavaScript
Text editor

PLS FAST HELP

Answers

i think it’s css.. if i am not mistaken.

How a web user interacts with the user interface to move through a website and the elements that assist in maximizing usability.

Answers

A web user interacts with the user interface of a website through various actions and elements to navigate and explore the content.

The usability of a website is maximized by incorporating elements that enhance the user experience and facilitate easy movement through the website.

When web user visits a website, they interact with the user interface by clicking on links, buttons, or navigation menus to move between different pages or sections. These interactive elements serve as navigation aids and provide clear pathways for users to explore the content. They should be designed intuitively, with labels and visual cues that guide users and help them understand where they are within the website's structure.

Additionally, elements such as search bars, dropdown menus, and breadcrumb trails contribute to the usability of a website. A search bar allows users to quickly find specific information or pages, while dropdown menus provide hierarchical navigation options. Breadcrumb trails display the user's location within the website's hierarchy and enable easy backward navigation.

To maximize usability, it is important to ensure that the user interface is visually appealing, responsive, and accessible across different devices. The layout should be well-organized, with a clear hierarchy and consistent design patterns. Interactive elements should be properly labeled and positioned, providing clear affordances for user actions.

Learn more about user interface design here:

https://brainly.com/question/30869318

#SPJ11

calculate how many 32-bit registers can be placed between 0xf10100 and 0xf10200 psychical address range if the address unit is 8 bits.

Answers

Given the physical address range and considering that the address unit is 8 bits, it can be calculated that 64 32-bit registers can be placed between the addresses 0xf10100 and 0xf10200.

First, note that the addresses given are in hexadecimal. The difference between 0xf10200 and 0xf10100 is 0x100, or 256 in decimal. Given that the address unit is 8 bits, each addressable unit corresponds to a byte. A 32-bit register comprises 4 bytes (since 1 byte = 8 bits). So, you divide the total number of addressable units (256 bytes) by the size of the register (4 bytes) to find the number of 32-bit registers that can be placed in that range. Doing the calculation, 256/4 equals 64, so you can fit 64 32-bit registers in the given physical address range.

Learn more about memory address calculation here:

https://brainly.com/question/32612621

#SPJ11

You carried out a PERT analysis of a very large activity-event network using only slightly skewed or symmetric beta distribution models for the activity durations. Your analysis yields a mean duration of 56.2 time units for the critical path with a variance of 3.4. What is your best estimate of the probability of successful project completion in 57 time units or less? Provide your answer as a number between 0 and 1 with 3 decimals (3 digits after the decimal point, for example: 0.123).

Answers

PERT (Program Evaluation and Review Technique) is a network analysis technique commonly used in project management.

It is particularly useful when there is a high level of uncertainty surrounding the duration of individual project activities. PERT uses probabilistic time estimates, which are duration estimates based on using optimistic, most likely, and pessimistic estimates of activity durations, or a three-point estimate.

These estimates help to identify the likelihood of meeting project deadlines and can assist project managers in developing effective project schedules and resource allocation plans. Overall, PERT is an important tool for managing complex projects with uncertain activity durations.

To know more about project management, refer to the link:

brainly.com/question/4475646#

#SPJ4

electronic data interchange (edi) is _____

Answers

Electronic Data Interchange (EDI) is a system that allows for the exchange of business documents and information electronically between different organizations or trading partners. EDI facilitates the exchange of data in a standardized and structured format, allowing for automated processing and integration into a company's business systems.

EDI replaces traditional paper-based methods of exchanging business documents, such as invoices, purchase orders, and shipping notices. With EDI, these documents are exchanged in a standardized electronic format, typically using a set of EDI message standards, such as ANSI X12 or EDIFACT.

EDI has several benefits for businesses, including faster processing times, reduced errors, improved data accuracy, and increased efficiency. It also helps to reduce the costs associated with paper-based processing, such as printing, mailing, and storage.

EDI is widely used in industries such as retail, healthcare, finance, and manufacturing, among others. It is an important tool for organizations that need to exchange large volumes of data with trading partners on a regular basis.

Learn more about EDI here:

https://brainly.com/question/29755779

#SPJ11

Electronic Data Interchange (EDI) is a system that allows for the exchange of business documents and information electronically between different organizations or trading partners.

EDI facilitates the exchange of data in a standardized and structured format, allowing for automated processing and integration into a company's business systems. EDI replaces traditional paper-based methods of exchanging business documents, such as invoices, purchase orders, and shipping notices. With EDI, these documents are exchanged in a standardized electronic format, typically using a set of EDI message standards, such as ANSI X12 or EDIFACT. EDI has several benefits for businesses, including faster processing times, reduced errors, improved data accuracy, and increased efficiency. It also helps to reduce the costs associated with paper-based processing, such as printing, mailing, and storage.

Learn more about EDI here:

brainly.com/question/29755779

#SPJ11

What is a cookie? *
Stores the password of the user.
Stores the commands used by the user.
Stores software developed by the user.
Stores information about the user's web activity.

Answers

Answer:

stores the password of the user

Explanation:

store password of the user

Describe how a cell’s content and format attributes are related.

Answers

Answer: They are independent and not related.

Explanation: Changing the format affects the content. Which of the following is NOT a way to change the column width in Excel?

a cell's content and format are similar. a cell's content and format are unrelated. the content of a cell is influenced by changing its format. the format of the cell is also affected when the content of the cell is changed.

hope this helps

_____________ are where you get down to business and enter data in a worksheet


None of the above

Cells

Tables

Fields

Answers

Answer:

cells

Explanation:

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

checking that input data is reasonable is programmatically impossible.
True or False

Answers

The statement "checking that input data is reasonable is programmatically impossible" is False. Checking the reasonableness of input data is a necessary process in programming. In summary, checking that input data is reasonable is programmatically possible. Programmers can write code that checks for data reasonableness through various validation rules and criteria set for the input data.

Programmers must check if the input data makes sense before processing it. This is to avoid problems or errors that may occur if the input data is incorrect or nonsensical. Checking for reasonable input data is a crucial aspect of programming and can be done programmatically.The programmer must define the limits of the input data or constraints of the system that the program is intended to operate in. The input data should be in the right format or data type, within an acceptable range, and should meet the criteria or validation rules set by the programmer. These validation rules help to check the reasonableness of the input data. For instance, if the program accepts numerical input, the programmer can set a validation rule that checks if the input is within a specific range of values. This is possible by writing a simple code that checks if the input data is greater or lesser than a specific value.

To know more about programming visit :

https://brainly.com/question/31163921

#SPJ11

on a network such as the one illustrated in the accompanying figure, what kind of computer controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information?

Answers

The computer that controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information is called a server.

A server is a computer system designed to handle requests from other computers or devices (called clients) on a network. In a client-server architecture, the server is responsible for managing and distributing resources and services to clients. Some common types of servers include:

File servers: store and manage files that can be accessed by multiple clients on the network.Print servers: manage and distribute print jobs to printers on the network.Database servers: store, manage and retrieve data from databases.Web servers: host websites and serve web pages to clients upon request.Application servers: host applications and provide access to them for clients.

Servers typically have more powerful hardware, larger storage capacity and are optimized for 24/7 operation compared to client computers. They play a crucial role in network infrastructure by providing centralized management and control of resources, as well as improved reliability, security, and scalability for networked computing environments.

To learn more about servers, use the link:

brainly.com/question/30168195

#SPJ4

I need help answering this question? Which problem does IPv6 (Internet Protocol version 6) help to solve?

a. Companies waste hundreds of public IP addresses. With IPv6, they can use just one IP address.

b. There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.

c. IPv5 is an outdated protocol version with insufficient security safeguards.

Answers

In this case we use the definition of volumes, which says that the volume displaced fluid on one side of the Pistons should be equal to the volume displaced on the other side of the piston.

What is force?

The force exerted at the large piston will be double in magnitude in comparison with the force applied at the smaller piston.

We know, according to the pascal's law,

The pressure applied at any point in the incompressible fluid is equal in magnitude at each and every point.

So,

P = Force/Area

Where P is pressure,

If pressure is same, then we can write,

F₁/A₁ = F₂/A₂

Where,

F₁ is the force applied at the small piston,

A₁ is the area of the smaller piston,

F₂ is the force at the larger piston,

A₂ is the area of the larger piston,

It is also given that, area if the larger piston is two times the area of the smaller piston so,

A₂ = 2A₁

So, putting the values we get,

F₂/F₁ = 2

So, F₂ = 2F₁

It means that the force exerted by the larger piston will be double in magnitude.

Therefore, In this case we use the definition of volumes, which says that the volume displaced fluid on one side of the Pistons should be equal to the volume displaced on the other side of the piston.

To know more about Pascal's Law, visit,

brainly.com/question/4262025

#SPJ1

What is greywater? A. waste water contaminated by human waste such as feces B. fresh water running out of taps and sinks C. waste water unpolluted by human waste such as feces D. salty water running out of taps and sinks E. purified water used for drinking purposes

Answers

Answer:

B. fresh water running out of taps and sinks

Explanation:

Greywater is simply the water that is created from activities such as showering, bathing or doing laundry.

According to the video, what are common tasks performed by Tour Guides? Check all that apply.

leading trips
maintaining equipment
shepherding tourists and luggage
socializing
purchasing tickets for flights
selling equipment
setting up meals
teaching first aid

Answers

Common tasks of the tour guide.

As per the question, the video shows us the tour guide n the ways he handles the tasks. The tour guide can be seen using making techniques such as providing tips, giving information, socializing with people, and setting up meals and other arrangements.

Thus the answer is leading trips, maintaining equipment, shepherding the tourists and luggage, and socializing, setting up meals.

Thus the duty of the tour guide its provide the latest information and provide the cratered services to the clients. The services like hotel, travel and maintains of the equipment's is essential for them. Thus the option 1, 2, 3,4 and 7 are correct.

Learn more about the according to the video.

brainly.com/question/19175630.

Answer: 1 2 3 4 7

Explanation:

what the other guy said

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

Which of the following of blockchain security features is NOT related to cryptography? Tamper resistance of the shared chain Decentralized consensus Integrity of orders and contents of blocks Encryption of block data on the chain

Answers

Decentralized consensus is the blockchain security feature that is NOT directly related to cryptography.

While cryptography plays a crucial role in ensuring the security of blockchain systems, decentralized consensus refers to the mechanism by which multiple participants in the network agree on the validity of transactions and the order in which they are added to the blockchain. It involves the use of consensus algorithms, such as Proof of Work (PoW) or Proof of Stake (PoS), to achieve agreement among participants. While cryptography is used to secure the data and maintain the integrity of transactions and blocks, decentralized consensus focuses on the agreement process and the distributed nature of decision-making in the blockchain network.

To know more about blockchain click the link below:

brainly.com/question/31236833

#SPJ11

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.

Answers

Answer:

2nd statement is True dear!!!

Answer:

Deques can contain lists.

A deque is a type of collection.

Deques can be created empty.

Explanation:

Answers can be found in Edge instructions

"You can make a deque whose members are lists."

"You can create an empty deque or create a deque with a list or a string."

"You have used lists and deques, which are two types of collections used by Python. "

A(n) ____ tells the compiler or interpreter that the character that follows it has a special purpose.

Answers

The answer that tells the compiler or interpreter that the character that follows it has a special purpose is called; An Escape Character

Computer Characters

The correct answer here is called ''Escape Character". This is because In computing and even in telecommunications, an escape character is a type of character that reinforces another interpretation on the next set of characters in a character sequence. An escape character is usually a peculiar case of using metacharacters.

From the definition above, we can see that the escape character tells the compiler or interpreter that the character that follows it has a special purpose.

Read more Computer characters at; https://brainly.com/question/6962696

A variety of memory cards and flash drives can be classified as _____ storage, which stores data in a nonvolatile, erasable, low-power chip.

Answers

A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

What are memory cards?

A memory card is known to be  a type of storage device that is known to be used for saving media as well as data files.

Note that this is a tool that helps to give  a permanent as well as non-volatile tool to be able to save data and files from any attached device.

Therefore, A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

Learn more about memory cards from

https://brainly.com/question/21708725

#SPJ1

What does it mean to "Try" to solve a problem?
*
A) To explain what the problem is.
B) To attempt to solve the problem with your plan.
C) To ask if your solution worked or not.
D) To research possible solutions and make a plan.

Answers

Answer:b

Explanation:

Hypothesis testing based on r (correlation) Click the 'scenario' button below to review the topic and then answer the following question: Description: A downloadable spreadsheet named CV of r was provided in the assessment instructions for you to use for this question. In some workplaces, the longer someone has been working within an organization, the better the pay is. Although seniority provides a way to reward long-serving employees, critics argue that it hinders recruitment. Jane, the CPO, wants to know if XYZ has a seniority pay system. Question: Based on the salary and age data in the spreadsheet, find the value of the linear correlation coefficient r, and the p-value and the critical value of r using alpha =0.05. Determine whether there is sufficient evidence to support the claim of linear correlation between age and salary.

Answers

In the given scenario, with a sample correlation coefficient of 0.94, a p-value less than 0.01, and a critical value of 0.438, the null hypothesis is rejected.

The linear correlation coefficient (r) measures the strength and direction of a linear relationship between two variables.

Hypothesis testing is conducted to determine if there is a significant linear correlation between the variables.

The null hypothesis (H0) assumes no significant linear correlation, while the alternative hypothesis (Ha) assumes a significant linear correlation.

The significance level (α) is the probability of rejecting the null hypothesis when it is true, commonly set at 0.05.

The p-value is the probability of obtaining a sample correlation coefficient as extreme as the observed one, assuming the null hypothesis is true.

If the p-value is less than α, the null hypothesis is rejected, providing evidence for a significant linear correlation.

The critical value is the value beyond which the null hypothesis is rejected.

If the absolute value of the sample correlation coefficient is greater than the critical value, the null hypothesis is rejected.

This implies that there is sufficient evidence to support the claim of a linear correlation between age and salary, indicating that XYZ has a seniority pay system.

To know more about null hypothesis visit:

https://brainly.com/question/30821298

#SPJ11

Outer
When one loop appears inside another, the loop that contains the other loop is called the ____ loop.

Answers

When one loop appears inside another, the loop that contains the other loop is called the outer loop. This is because the inner loop is contained within the outer loop and is executed multiple times for each iteration of the outer loop. The outer loop sets the conditions for the inner loop and controls how many times the inner loop will execute.

Nested loops are commonly used in programming to solve complex problems that require repetitive actions. For example, if you need to print out a table with rows and columns, you can use a nested loop to iterate through each row and column. The outer loop controls the rows, while the inner loop controls the columns. By nesting the loops, you can execute the necessary actions in a structured and efficient manner.

Overall, understanding nested loops is an essential concept in programming, as it allows you to tackle more complex problems and automate repetitive tasks. By understanding the concept of the outer loop, you can control the flow of execution and create more efficient and effective code.

Learn more about loop here:

https://brainly.com/question/30706582

#SPJ11

What is the difference between a class and an object in Python?

Answers

Answer:   A class is a template for creating Python objects within a program, whereas the object itself is an instance of the Python class. You can think of a class as a blueprint for an object that includes the available functions and data variables.

Explanation:

A collection of data (variables) and methods (functions) that act on those variables constitutes an object. A class, similarly, is a blueprint for that object. A class can be compared to a rough sketch (prototype) of a house.

Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:

Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her computers started to malfunction, and all her files were no longer accessible. What do you think happened to Ana’s computer and what can you do to avoid the same problem​

answer pleasssseeee

Answers

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

Other Questions
which occurs immediately after birth that increases the risk for cadiac decompensation in a client with a compromised cardiac system what is the measure of A. 140 degreesB. 20 degreesC. 160 degreesD. 90 degrees How does the air on a hot day compare with the air on a cold day? Isolate y in terms of x2x+y/3=4 To find the x-intercept ofthe graph of a linear equation, can you substitute 0for x and solve the equation? Explain. Samir is using an external hard disk with File History to back up files from his laptop. He needs to detach the hard disk for another task, so he configures an external SSD to be used with File History.Which of the following is most likely to occur in this scenario?Group of answer choicesBoth drives can be used simultaneously with File History.The backed-up data on the hard disk will not be deleted.The SSD will be formatted with NTFS for use with File History.Samir will not be able to save other files on the SSD. What does (2x2)(3x+5) equal? A bookseller bought 200 copies of a certain books.some of them were sold at the published price of 500 naira each and the remaining copies were sold at reduced price of 450 naira each .if the book seller made 97 500 naira altogether,how many copies were sold at each price. Scenario 2.2 A manager observes a worker assembling gift baskets and records the data displayed in the table Time minutes) Observations 18 10 20 12 22 15 Use the information in Scenario 2.2. What is the average time for this job element? 21.37 minutes 20.27 minutes 18.54 minutes 16.33 minutes What is a formula of area of equilateral triangle? if a 12 V battery is connected to the circuit shown, and R1 and R2 are EACH 2 ohm resistors; what must be the resistance of R4 be if R3 is 4 ohms and the total current is 2 amp? Find the slit separation (in m) of a double-slit arrangement that will produce interference fringes 0.0218 rad apart on a distant screen when the light has wavelength 531 nm. I would really appreciate it if someone helped me. For the function f(x) = 2x^3 + 3x^2 +1: a. Using Calculus and a sign chart, find the intervals on which f(x) is increasing and decreasing, and identify any local extrema. Give intervals in interval notation and local extrema as ordered pair(s). b. Using Calculus and a sign chart, determine where f(x) is concave up and concave down, and locate any inflection points. Give intervals in interval notation and inflection points as ordered pair(s). Somone please tell me the answer to 10? which of the following is not a pythagorean triple? a. (6,8,10)b.(4,6,7)c.(5,12,13)d.(9,12,15) (20 points) An island economy produces only two goods, coconuts and pineapples. There are four people (A, B, C, and D) living on the island with the following preferences. Construct a set of indifference curve for each individual with pineapples on the vertical axis and coconuts on the horizontal axis. a. A likes both but has a strong preference for pineapples. b. B also likes both but has a strong preference for coconuts. c. C likes coconuts but doesn't care for pineapples. d. D will only consume pineapples and coconuts in the fixed proportion of one pineapple to one coconut. Which of the following forms of intellectual property does have a system of registration at the federal level?Group of answer choicesTrade SecretCopyrightTrademarkPatent Question 4Which of the following sentences provides the strongest evidence that may followed the rules ofetiquette properly but was also careful to avoid offending those who did not?OAShe did not know to sit between her mother and aunt at the operaFaustShe asked Archer to tell Ellen Olenska about the engagementJone"notShe knew not to wear satin in front of Archer and always carried a fan of "eaglefeathersDShe asked her mother to look "reluctant" during the engagement announcementmade at the ball I need help on these questions please im giving 66 points