1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
5

the administrator in an Exchange Server needs to send digitally signed and encrypted messages. What should the administrator use

Computers and Technology
1 answer:
pantera1 [17]3 years ago
4 0

In the above scenario of Exchange Server, the administrator should use S/MIME.

<h3>What is S mime tells?</h3>

S/MIME is a short form of the word Secure/Multipurpose internet Mail Extensions. This is known to be a famous and well used protocol that is often employed in transferring or sending digitally signed and encrypted messages.

Note that the S/MIME is often used in Exchange Online as it helps to give a lot of services for email messages such as Encryption.

Learn more about Server from

brainly.com/question/17062016

You might be interested in
In what cases would you denormalize tables in your database?
ad-work [718]

Answer: Denormalize is the mechanism is carried out by addition of the redundant bits in the already normalized database.The data is attached in the form of attributes,adding new tables.

This technique is used in the case of previously normalized data collection which requires improvement in the performance by reducing the errors.The improvement is made by making database readable ,adding  group of data in redundant form etc.

When data is to be retrieved quickly then also denormalization is used as by grouping or collecting information into a single table.

6 0
3 years ago
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
RideAnS [48]

<u>Explanation:</u>

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

  • They help detect security loopholes before a cyberattack.
  • They determine how vulnerable a network or computer program is.
  • They advise the IT firm's security teams on how to mitigate vulnerabilities detected.

7 0
3 years ago
Which of the following is true concerning copying, moving, cutting, and pasting both
katrin2010 [14]

Material that has been cut or copied from a document is placed on a virtual  clipboard from which it can be pasted into a document in another program is true.

(A) material that has been cut or copied from a document is placed on a virtual  clipboard from which it can be pasted into a document in another program.

<u>Explanation:</u>

In computer or laptop or desktop, cutting or coping or moving and pasting images or files is done as normal operation in computer.

Virtual clipboard is used for copy or moving or cutting of media files or document or images.

Short keys are available in windows operating system to do copy or select all or cutting or pasting.

To list the virtual clipboard windows end user can get by clicking windows key + v.

Virtual clipboard can be syncing with their Hotmail account also.

3 0
4 years ago
Create a program to compute the fee for parking in a garage for a number of hours. The program should: 1. Prompt the user for ho
Harman [31]

Answer:

The ans will be given in the python script below. A picture of the answer is also attached

Explanation:

print("Welcome To Garage Parking Fee Calculator")

hours = float(input("Type the number of hours parked :  "))

#fee per hour

rate = 2.40

#multiply rate per hour by the number of hours inputted

price = rate * hours

if price < 6:

   price = 6

if price > 20:

   price = 20

print("Parking fee is:  $", +price)      

7 0
3 years ago
Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE
weeeeeb [17]

Answer:

True

Explanation:

Forwarded events can only be recorded when systems administrators have de-established an event subscription.

8 0
3 years ago
Other questions:
  • Why don't we get together to watch the Academy Awards?
    15·2 answers
  • Can you answer your own question on brainly?
    12·2 answers
  • How do computer worms spread​
    11·1 answer
  • Which of the following is NOT a fixed expense?
    6·1 answer
  • When seeking information on the internet the most helpful place to look is?
    14·2 answers
  • Software people commonly use in the workplace to make their life easier is called?
    11·2 answers
  • Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Lead
    15·1 answer
  • What does input allow a computer to do
    14·1 answer
  • What would you need to do if you wanted a computer to always look for a bootable CD before looking to the local hard drive
    10·1 answer
  • he memory protection requirement must be satisfied by the operating system rather than the processor. True False
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!