1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
6

Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f

irewall to protect the internal network?
Computers and Technology
1 answer:
ella [17]3 years ago
3 0

Answer:

DMZ-based.

Explanation:

VPN or virtual private network, as the name implies, is a network virtually extending a private network over a public network or the internet, to provide secure access to users that can not physical access the actual private network.

Delimitarized zone DMZ is an isolated point between an internal or private network and the internet, configured to provide access to untrusted or unauthorized users. The DMZ- based VPN is a virtual private network with two firewalls securing the internet and private network end, but provides access to users.

You might be interested in
Description
lapo4ka [179]

Answer:

from datetime import time, datetime, timedelta, date

for _ in iter(list, 0):

   t1 = input("Please enter time one: ")

   t2 = input("Please enter time two: ")

   if t1.isdigit() == True and (int(t1[:2])<=23 and int(t1[2:]) <= 59)\

       and t2.isdigit() == True and (int(t2[:2])<= 23 and int(t2[2:])<=59):

       time_1 = time(hour=int(t1[:2]), minute=int(t1[2:]))

       time_2 = time(hour= int(t2[:2]), minute=int(t2[2:]))

       if time_1 > time_2:

           diff = datetime. combine (date. today( ), time_1) - datetime. combine(date. today ( ), time_2)

       else:

           diff = datetime. combine (date. today( ), time_2) -datetime. combine(date. today ( ), time_1)

       diff_list = str(diff).split(":")

       del diff_list[2]

       diff_t = "". join (diff_list)

       print(diff_t)

       break        

   if t1.isdigit() == False or t2.isdigit() == False:

       print("Military Time Forest Required: Bad input, try again.")

       continue

   elif int(t1[:2])> 23 or int(t2[:2])> 23:

       print("Military Tine Format Required: Hours must be between 00 and 23, try again")

       continue

   elif int(t1[2:])> 59 or int(t2[2:])> 59:

       print("Military Tine Format Required: Minutes must be between me and 59, try again")

       continue

Explanation:

The python Datetime package is used to manipulate date and time, creating immutable Datetime objects from the various python data types like integer and string. The block of code above is a conditional for-loop statement that gets two user time value inputs and prints out the difference as a string in Military forest time format.

5 0
3 years ago
A(n) _____ converts the programming instructions written by programmers into a language that the computer understands and proces
qaws [65]

Answer: Translator

Explanation:

each instruction written by programmer in another language must be converted (translated) to machine language in order to process, because computer understand only machine language( 0 and 1). that is translator.

8 0
3 years ago
The CPI is a measure of the overall cost of the goods and services bought by a. a typical consumer, and the CPI is computed and
Akimi4 [234]

Answer:

a typical consumer, and the CPI is computed and reported by the Bureau of Labor Statistics.

Explanation:

The CPI is a measure of the overall cost of the goods and services bought by a typical consumer , and the CPI is computed and reported by the Bureau of labor statistics. Hence, option C is correct.

5 0
3 years ago
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of ite
hjlf

Answer:

2 times as many items can be uniquely identified

Explanation:

Option 'C' is the answer. because

if we use 6 bit binary sequence

then

No. of Unique address will be = 2 ^ 6  = 64

as we increase the bit by 1. Now total bits are 7.

so

No. of Unique address for 7 bit Sequence = 2 ^ 7  = 128

So,

128 is double of 64, that is 2 times greater value than 64.

6 0
3 years ago
When the wires are connected to the terminals of the battery, what causes electric current in the circuit?
Anastaziya [24]

Answer: The battery provides a voltage between terminals. The electric field set up in a wire connected to the battery terminals causes the current to flow, which occurs when the current has a complete conducting path from one terminal of the batter to the other. This is called a circuit.

Explanation:

4 0
3 years ago
Other questions:
  • What is the recommended point size for a slide title?<br> 12–22<br> 24–40<br> 44–66<br> 54–80
    6·1 answer
  • Demote the "Arrive and leave at the same time each day." List item, and then promote the "Respect" list item.
    6·1 answer
  • Which of the following commands would I use to begin a new presentation?
    14·1 answer
  • Assume you have a int variable n that has already been declared and initialized. Its value is the number of integers that need t
    13·1 answer
  • Almost all application programs are designed to run with a specific platform. Group of answer choices True False
    15·1 answer
  • 1. What is the central idea of the section "Service Record." Use two text details to
    8·1 answer
  • I NEED A BIG BRAIN BOYO TO HELP ME
    14·1 answer
  • Which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​
    7·2 answers
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
  • Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!