1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
1 year ago
11

you are configuring a server that will be used by an external organization. what is required when you install the ad fs role on

a windows 2016 server?
Computers and Technology
1 answer:
agasfer [191]1 year ago
8 0

you are configuring a server that will be used by an external organization. <u>Web Application Proxy servers</u> Web Application Proxy servers.

What is a proxy server?

A proxy server i<u>s a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting</u>. A proxy server is a server program used in computer networking that <u>stands between a client and the server</u> supplying the resource that the client is requesting.

Proxies add a <u>significant degree of protection to your machine.</u> They can be configured as firewalls or web filters to defend your computer against online dangers like viruses.

<u>This added security from a </u><u>proxy </u><u>server is also beneficial when used in conjunction with a secure web gateway or other email security tools</u>. Using this method, you can filter traffic based on the level of security it offers or the volume of traffic your network—or certain computers—can handle.

To learn more about proxy server, use the link given
brainly.com/question/9257742
#SPJ4

You might be interested in
Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
kozerog [31]

Answer: bandwidth = 0.10 MB/s

Explanation:

Given

Total Time = Compression Time + Transmission Time

Transmission Time = RTT + (1 / Bandwidth) xTransferSize

Transmission Time = RTT + (0.50 MB / Bandwidth)

Transfer Size = 0.50 MB

Total Time = Compression Time + RTT + (0.50 MB /Bandwidth)

Total Time = 1 s + RTT + (0.50 MB / Bandwidth)

Compression Time = 1 sec

Situation B:

Total Time = Compression Time + Transmission Time

Transmission Time = RTT + (1 / Bandwidth) xTransferSize

Transmission Time = RTT + (0.40 MB / Bandwidth)

Transfer Size = 0.40 MB

Total Time = Compression Time + RTT + (0.40 MB /Bandwidth)

Total Time = 2 s + RTT + (0.40 MB / Bandwidth)

Compression Time = 2 sec

Setting the total times equal:

1 s + RTT + (0.50 MB / Bandwidth) = 2 s + RTT + (0.40 MB /Bandwidth)

As the equation is simplified, the RTT term drops out(which will be discussed later):

1 s + (0.50 MB / Bandwidth) = 2 s + (0.40 MB /Bandwidth)

Like terms are collected:

(0.50 MB / Bandwidth) - (0.40 MB / Bandwidth) = 2 s - 1s

0.10 MB / Bandwidth = 1 s

Algebra is applied:

0.10 MB / 1 s = Bandwidth

Simplify:

0.10 MB/s = Bandwidth

The bandwidth, at which the two total times are equivalent, is 0.10 MB/s, or 800 kbps.

(2) . Assume the RTT for the network connection is 200 ms.

For situtation 1:  

Total Time = Compression Time + RTT + (1/Bandwidth) xTransferSize

Total Time = 1 sec + 0.200 sec + (1 / 0.10 MB/s) x 0.50 MB

Total Time = 1.2 sec + 5 sec

Total Time = 6.2 sec

For situation 2:

Total Time = Compression Time + RTT + (1/Bandwidth) xTransferSize

Total Time = 2 sec + 0.200 sec + (1 / 0.10 MB/s) x 0.40 MB

Total Time = 2.2 sec + 4 sec

Total Time = 6.2 sec

Thus, latency is not a factor.

5 0
2 years ago
Is monitor is a television​
Stolb23 [73]

Answer: Can you rephrase the question

Explanation:

3 0
3 years ago
Read 2 more answers
The_provides access to the internet may also be internal​
fgiga [73]

Local Area Network (LAN), Hope this helps

4 0
2 years ago
what you can do to increase your chances of getting employed with changes to your current digital footprint​
xxTIMURxx [149]
1) Show your work. Build an electronic portfolio, ideally on a website that you own, that shows the skills you have and the projects you have worked on. ,
2) Create a professional account on LinkedIn with your resume and recent photo. Connect with others there who can help you land a job.
3) Don't put anything on social media that would be embarrassing to you if your family found out or if it appeared in the newspaper or on the television news. Always assume that whatever you put online can be shared, no matter what the privacy setting is supposed to be.
4) Network with professionals who are doing the sort of work that you aspire to do. Ask thoughtful questions about the work that they do that you admire.
4 0
3 years ago
Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
nexus9112 [7]

Answer:

No i did not know that.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • What effect can camera tilt create? Do you think this is effective? Why or why not?
    13·1 answer
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • ____ is the most widely used language for writing system software because it combines the power of a high-level language with th
    12·1 answer
  • In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the righ
    14·1 answer
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • Taking a group of recipes and identifying the similarities is an example of _____.
    13·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Zara wants to create some lines of code that are ignored by the computer. What should these lines begin with?
    5·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!