1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
14

You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users

using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?
Computers and Technology
1 answer:
svetlana [45]3 years ago
4 0

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

You might be interested in
Which of the following actions is most likely to be effective in reducing the digital divide at a local level? A Creating an app
Mekhanik [1.2K]

Answer: C

Explanation:

4 0
2 years ago
What are the primary functions of motor oil? a. Reduce friction and prevent wear b. Keep engine surfaces clean c. Remove heat to
ryzh [129]

The answer is E: all of the above.

7 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
2 years ago
Who likes video games
polet [3.4K]
I wish i could play but my strict mom would never let me :’(
3 0
2 years ago
Your program Assignment This game is meant for tow or more players. In the same, each player starts out with 50 points, as each
Anika [276]

Answer:

The code is given below in Java with appropriate comments

Explanation:

//Simulation of first to one game

import java.util.Random;

public class DiceGame {

  // Test method for the Dice game

  public static void main(String[] args) {

      // Create objects for 2 players

      Player player1 = new Player("P1", 50);

      Player player2 = new Player("P2", 50);

      // iterate until the end of the game players roll dice

      // print points after each iteration meaning each throw

      int i = 0;

      while (true) {

          i++;

          player1.rollDice();

          System.out.println("After " + (i) + "th throw player1 points:"

                  + player1.getPoints());

          if (player1.getPoints() == 1) {

              System.out.println("Player 1 wins");

              break;

          }

          player2.rollDice();

          System.out.println("After " + (i) + "th throw player2 points:"

                  + player2.getPoints());

          if (player2.getPoints() == 1) {

              System.out.println("Player 2 wins");

              break;

          }

      }

  }// end of main

}// end of the class DiceGame

// Player class

class Player {

  // Properties of Player class

  private String name;

  private int points;

  // two argument constructor to store the state of the Player

  public Player(String name, int points) {

      super();

      this.name = name;

      this.points = points;

  }

  // getter and setter methods

  public String getName() {

      return name;

  }

  public void setName(String name) {

      this.name = name;

  }

  public int getPoints() {

      return points;

  }

  public void setPoints(int points) {

      this.points = points;

  }

  // update the points after each roll

  void rollDice() {

      int num = Die.rollDice();

      if (getPoints() - num < 1)

          setPoints(getPoints() + num);

      else

          setPoints(getPoints() - num);

  }

}// end of class Player

// Die that simulate the dice with side

class Die {

  static int rollDice() {

      return 1 + new Random().nextInt(6);

  }

5 0
3 years ago
Other questions:
  • An object reference provides a(an)______for an object and is used to gain access to the object (Points : 2) entry
    11·1 answer
  • AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
    15·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • Name a computer programme that designers are likely to use to create a leaflet advertising their new product
    15·1 answer
  • Give one example of a civil engineering structure.
    5·1 answer
  • 3. A security system uses sensors at every door and window which will set off analarm if any one of them is opened. There is als
    15·1 answer
  • World pade is world processing software true or false​
    15·1 answer
  • A drive is small enough to be carried in one's pocket.
    6·1 answer
  • What role does the automated surface observing system.
    5·2 answers
  • write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the conve
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!