1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
2 years ago
15

Which remote access role service allows publishingweb-based applications for use by clients outside thenetwork?

Computers and Technology
1 answer:
erica [24]2 years ago
5 0

Web Application Proxy remote access role service allows publishing web-based applications for use by clients outside the network.

<h3>What is Web Application Proxy ?</h3>

End users can access apps from outside the corporate network on any device thanks to the Web Application Proxy service in Windows Server 2012 R2. A number of security features are offered by Web Application Proxy to safeguard your corporate network from outside threats. Only users on devices that authenticate and are authorized can access your corporate apps thanks to Web Application Proxy, which uses AD FS for authentication and authorization. A type of server known as a remote access server (RAS) offers a number of services to customers who are connected remotely across a network or the Internet. The new Remote Access role service in Windows Server® 2012 R2 is called Web Application Proxy. For web apps on your business network, Web Application Proxy offers reverse proxy capabilities, enabling users with any device to access them from outside the corporate network. The Windows 2012 Remote Access role, which also contains Direct Access, VPN, and routing services, includes the Web Application Proxy (WAP) as a role service.

Learn more about Web Application Proxy here:

brainly.com/question/10621540

You might be interested in
Define file manager
Mama L [17]

Answer:

A file manager or file browser is a computer program that provides a user interface to manage files and folders.

3 0
3 years ago
As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
Tasya [4]

Answer:

i dont get it

Explanation:

what is the question?

4 0
3 years ago
Which property of a text element controls how the browser handles text that does not fit within the element box?
BaLLatris [955]
Margin because it is always on the end of document
6 0
4 years ago
Is the process of modifying something to make it fit certain criteria.
alexandr402 [8]

Answer:

Design Process

8 0
3 years ago
After the closing entries have been posted:
Nimfa-mama [501]
Closing entries are entries<span> made at the end of an accounting period to zero out all temporary accounts. The balances are transferred to permanent accounts. 
After the closing entries have been posted:
A. the temporary accounts are zeroed out
Revenues and expenses are transferred to the income Summary Account and then Income Summary is closed to Retained earnings.</span>
7 0
3 years ago
Other questions:
  • Carl sent an e-mail to more than three thousand employees about a software update. The employees need to prepare for this update
    7·2 answers
  • If your driving privilege is suspended or revoked you may be eligible to apply for a hardship license or reinstatement to determ
    13·2 answers
  • Do you think technology and social media have made it easier or more difficult to make connections and find a job? Explain.
    12·1 answer
  • The ____ method writes a newline character after the data.
    11·1 answer
  • The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for
    11·1 answer
  • WILL UPVOTE ALL
    10·1 answer
  • Mrs. Sims polled her students about which social media app they use most. Which type of chart would best display this data?
    9·1 answer
  • Why are various creative works split up into different types under copyright law?
    9·1 answer
  • A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
    14·1 answer
  • Write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision Additional No
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!