1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
1 year ago
11

you are configuring a server that will be used by an external organization. what is required when you install the ad fs role on

a windows 2016 server?
Computers and Technology
1 answer:
agasfer [191]1 year ago
8 0

you are configuring a server that will be used by an external organization. <u>Web Application Proxy servers</u> Web Application Proxy servers.

What is a proxy server?

A proxy server i<u>s a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting</u>. A proxy server is a server program used in computer networking that <u>stands between a client and the server</u> supplying the resource that the client is requesting.

Proxies add a <u>significant degree of protection to your machine.</u> They can be configured as firewalls or web filters to defend your computer against online dangers like viruses.

<u>This added security from a </u><u>proxy </u><u>server is also beneficial when used in conjunction with a secure web gateway or other email security tools</u>. Using this method, you can filter traffic based on the level of security it offers or the volume of traffic your network—or certain computers—can handle.

To learn more about proxy server, use the link given
brainly.com/question/9257742
#SPJ4

You might be interested in
How do you get past a firewall ?
DaniilM [7]
Use a Web-based Proxy. ...
Use a VPN. ...
Use Remote Access to Your Own PC. ...
Kill the Blocking Service. ...
Use Mobile Data as a Stopgap. ...
What if You're Using a Phone? ...
Sneaky Like a Boss.
3 0
3 years ago
If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?
Digiron [165]

Answer:

its 72

Explanation:

i know it because i did it and thats how i know it

6 0
2 years ago
_____ are like selection lists in which they limit fields to a set of possible values; but, unlike selection lists, the options
natali 33 [55]

Radio buttons exist like selection lists in which they limit fields to a set of potential values; but, unlike selection lists, the options appear as respective controls in the web form.

<h3>What is Radio button?</h3>

A radio button or option button exists as a graphical control element that permits the user to select only one of a predefined set of mutually exclusive options. The singular property of a radio button causes it distinct from checkboxes, where the user can select and unselect any numeral of items.

Radio buttons exist as a common way to permit users to make a single selection from a list of options. Since only one radio button can be selected at a period (within the same group), each available option must be its item and label. Radio buttons exist like selection lists in which they limit fields to a set of potential values; but, unlike selection lists, the options appear as respective controls in the web form.

To learn more about Radio button refer to:

brainly.com/question/20476366

#SPJ4

8 0
2 years ago
PLEASE HELP!
Basile [38]

Answer:

declare count as integer

7 0
3 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
Other questions:
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    7·1 answer
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • Technician A says that the push rod connects to a pivoting component mounted at the top of the cylinder head called the camshaft
    14·2 answers
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • ) Which is true about the agile method?
    7·1 answer
  • Life Decisions Cyber Cafe is a cafe with free Internet service and computers that are linked to various online career opportunit
    15·1 answer
  • What is the preferences of occupation in ones life?
    14·1 answer
  • Assessment
    12·1 answer
  • It can be hard to get close enough to photograph animals in the wild true or false
    14·2 answers
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!