1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
14

You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users

using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?
Computers and Technology
1 answer:
svetlana [45]3 years ago
4 0

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

You might be interested in
someone who protects valuable online information, like phone numbers and passwords would be considered​
charle [14.2K]

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

6 0
3 years ago
What term is used to describe a list of security policies that is associated with an object?
Artemon [7]

Answer:

An Access control list (ACL) is used to describe a list of security policies that is associated with an object

5 0
3 years ago
The __is the temporary storange location for text when it is cut from a document
enot [183]
The informal answer to your question is "clipboard". However, there isn't such a thing as the "clipboard". The people who came up with the idea of the clipboard use that nomenclature to describe the location in memory where that copied data resides. So the formal answer to your question is memory or RAM.
3 0
3 years ago
A student is reading a book for language arts. She has to finish three chapters by class tomorrow, because there will be a quiz.
Jobisdone [24]

Answer:

Distracted..?

8 0
3 years ago
Read 2 more answers
i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec
Sonbull [250]

Answer:

which mobile game? Whatever the worst thing you can do is. If its slurs and harassment or bullying report them

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
    10·1 answer
  • "Consideration of being digitally" literate Means to produce digital technology Participate in digital activities none of the ch
    11·1 answer
  • Solve the following quadratic equation <br><br>y=6x^2-12x+1
    9·1 answer
  • What happens when a flash memory card is installed in a slot and it is recognized by windows?
    6·1 answer
  • When a JSP page is compiled, what is it turned into?
    11·1 answer
  • Rounding up and down for 389,422
    7·1 answer
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
  • List three features of the third generation of computers
    13·1 answer
  • HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES
    6·1 answer
  • What are different social phenomenas are you aware of that used part of a social movement, change, or cause
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!