1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
14

You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users

using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?
Computers and Technology
1 answer:
svetlana [45]3 years ago
4 0

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

You might be interested in
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these question
11111nata11111 [884]

Answer:

a. Youthful

Explanation:

The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.

8 0
3 years ago
Which phone has the most GB (Gigo Bites)<br><br>A.Samsung<br>B.Iphone<br>C.LG<br>D.ZTE
Lina20 [59]
It's GigaBytes actually. And is it RAM or storage capabilities?

And also those are brands. Not models. For example, Samsung has different phones. Not just one.


7 0
3 years ago
Read 2 more answers
Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches
MA_775_DIABLO [31]

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

4 0
2 years ago
Whats a good way to remember to log out
Gemiola [76]
You just need to set a reminder on your phone and try and remember

3 0
3 years ago
with the aid of your own example explain how memory,registers and secondary storage all work together​
AnnyKZ [126]

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

<h3>How does memories works together?</h3>

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

brainly.com/question/25040884

6 0
2 years ago
Other questions:
  • What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
    12·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • Which of the following is defined as the elastic leasing of pooled computer resource over the Internet? 1) Broadband 2) Wiki 3)
    13·1 answer
  • How do you create multiple columns in Word?
    9·1 answer
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • Which of these is NOT an input device?
    14·1 answer
  • Write. true or false​
    5·2 answers
  • C
    5·1 answer
  • The PowerPoint view in which you can edit the slide master is called ______________.
    7·1 answer
  • 1) What is Database? List its Uses.<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!