1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
4 years ago
15

If an external server needs to communicate with servers inside the green zone, which network setting on smoothwall can be opened

?
Computers and Technology
2 answers:
Vedmedyk [2.9K]4 years ago
6 0

The network setting on smooth wall that can be opened if an external server needs to communicate with servers inside the green zone is to open the pinholes with the use of DMZ in the green zone.

Further Explanation:

DMZ is basically the buffer zone between the external network and company network. DMZ works between both the firewalls since all incoming packets are checked by the firewall before they reach servers the company hosts in the DMZ. It is efficient for most of the threats.

Pinholes are communication point of the DMZ in the LAN network. By default, it blocks all the incoming packets.  

Therefore, it is concluded that the pinholes are the communication venue of the DMZ in the green zone.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: Computer Engineering

Subject: Computer Science and Engineering

Chapter: Computer Network

Keyword:

Computer, network, CPU, RAM, ROM, hardware, software, indexing, communication, Windows, Linux, server, demilitarized zone, DMZ, LAN,WAN, buffer zone, pin holes, external server, green zone, network, firewalls, host, block, incoming packets

astraxan [27]4 years ago
3 0

The network setting on the smooth wall that can be opened when the external server has the need to communicate with the servers inside the green zone is the DMS±pinholes as the pinhole will be opened with the use of the DMZ and to the green zone.

You might be interested in
The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
Snezhnost [94]

Answer:

The arguments in a method call are often referred to as <u>actual parameters</u>. The variables in the method declaration that accept the values from the actual parameters are <u>formal parameters</u>.

Explanation:

Method is a small piece of program that is used to solve the particular problem. The problem may be repeat at multiple instances, so a method is written and call it on multiple places where it needed.

There are two different types of parameters used in methods. Actual parameters and formal parameters. Actual parameters are those, that are used in method call contain actual values that need to processed through method. Formal parameters are used for the purpose of declaration and accept the values that contains by actual parameters at the time of method call.

4 0
3 years ago
Georgenotfound??? question mark??
Arlecino [84]

Answer:

hi

Explanation:

8 0
4 years ago
Read 2 more answers
A form letter can be customized by using different fields in a __________.
alexgriva [62]
I think the answer to this is  C.email
4 0
3 years ago
Read 2 more answers
When creating a document template, you can either start from an existing document or begin from _____.
Anna35 [415]
A new blank document
7 0
3 years ago
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
riadik2000 [5.3K]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

       System.out.println("Enter a character");

       Scanner in = new Scanner(System.in);

       char character = in.next().charAt(0);

       System.out.println("Enter a string");

       String string = in.next();

//Calling the method        

System.out.println(countChar(character,string));

   }

   public static int countChar(char a, String in){

       int counter =0; // initialize counter

       for (int i=0;i<in.length();i++){

           if(a == in.charAt(i))

               counter++;

       }

       return counter;

   }

}

Explanation:

This program is written in Java Programming language.

We created a method countChar that returns a integer called counter

Using a for loop in the method we iterate through the string object and check (a == in.charAt(i)) so as to increase counter when ever there is a match.

In the main method a Scanner Class is used to request user to input a character and a string which is passed to countChar when called.

NOTE that this program has considered lower case letters to be different from upper cases as such a is not equal to A

3 0
3 years ago
Other questions:
  • On the UB-04 claim form, the type of bill is identified by a four-digit numerical code. The first digit is a leading zero, what
    10·1 answer
  • 6.6 Write a function named timesTen. The function should have an integer parameter named number. When timesTen is called, it sho
    7·1 answer
  • Select the correct answer.
    7·1 answer
  • Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The perf
    15·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • Which of the following is not a reserved keyword in python?​
    13·1 answer
  • How do i code........​
    6·2 answers
  • Multiple Choice
    7·1 answer
  • If you are going to analyze and interpret data, you need to do all of the following execept blank.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!