1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
4 years ago
14

You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users

using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?
Computers and Technology
1 answer:
svetlana [45]4 years ago
4 0

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

You might be interested in
What is a propriety database
Alexxandr [17]
A proprietary database is a database that is not open to the public and has a password and is owned privately
3 0
4 years ago
Which Windows feature allows secure printing over the Internet?​
ludmilkaskok [199]

Answer:

You need to install Windows 7 over an existing version of Windows.

Explanation:

Brainiest??

3 0
3 years ago
What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.
Kobotan [32]

Answer:

Ctrl + Alt + Del

Explanation:

4 0
2 years ago
Can someone please answer these questions! Thank you :)
kolbaska11 [484]
1. Technology is something that makes things easier. 2. Technology help students in someway maybe find information about something the good thing about technology in students is that they can learn more things and the bad thing is that technology can be dangerous for students,
3 0
3 years ago
What are availabilities and uses of solar energy/panels? (please explain as much as you can)
mixer [17]
Solar panels can be very useful, an they help reduce the use of other power plants that release pollutants into the air. Solar panels have some cons, as the very good ones that have better cells that can store more energy are more expensive, but it is worth the investment, because a big enough field of panels can power a lot of a things during a power outage.

If anyone else has anything about the availability of solar panels, feel free to add.

Hope this helps :) 
6 0
3 years ago
Other questions:
  • How do you enlarge your screen if there is no control panel? Need desperate help!
    15·1 answer
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants
    5·2 answers
  • What are all the folders located on the DOCK called?
    11·1 answer
  • Which sentence best describes a lifestream?
    8·2 answers
  • Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
    13·1 answer
  • Why are renewable natural resources important? A.fossil fuels can be replaced quickly.
    10·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • On React
    13·2 answers
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!