1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
5

You have been tasked to set up an authentication server on a dmz that will allow only users from a partner company. what kind of

network are you configuring?
Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
7 0

The question above has multiple choices as follows;

a. Internet

<span> b. Intranet <span> c. Extranet <span> d. World Wide Web
Correct answer is C. Extranet
<span>You are able to use an Extranet to securely share part of a business’s operation with vendors, suppliers, customers, partners or any other business organization.  We can also view an extranet as an intranet extended to users outside the company.</span> </span></span></span>




You might be interested in
Help please brainliest
V125BC [204]

Number one is x-axis.

3 0
3 years ago
Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
miskamm [114]

Lighting is an important aspect in creating a great photograph.

Not only does lighting determine brightness and darkness, but it also influences

  • tone,
  • mood, and
  • atmosphere.

As a result, proper light management and manipulation are required to get the

  • best texture,
  • richness of color, and
  • brightness on your objects.

<h3>What kind of light produces the best photos?</h3>

Because of its mobility, a speedlight or flash is frequently the ideal photographic illumination on-site. Speedlights can handle much of the work of studio strobes when used with an off-camera wireless flash system.

Learn more about lighting in photography:
brainly.com/question/2321244
#SPJ1

3 0
1 year ago
HELP FAST
Ghella [55]

Answer:

spelling errors and/or punctuation errors

4 0
3 years ago
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
Zinaida [17]

A feature of cryptography which is used to prove an end user's identity and prevent an individual from fraudulently reneging on an action is nonrepudiation.

<h3>What is nonrepudiation?</h3>

Nonrepudiation can be defined as an assurance that the sender of a message is given a proof of delivery and the recipient of this message is also provided with a proof of the sender’s identity, so none of them can deny having processed this message.

This ultimately implies that, nonrepudiation is a security service which has a feature of cryptography and it can be used to prove an end user's identity and prevent an individual from fraudulently reneging on an action

Read more on nonrepudiation here: brainly.com/question/14631388

#SPJ1

7 0
2 years ago
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
I am Lyosha [343]

Answer:

grid computing

Explanation:

Based on the information provided within the question it can be said that this technology is typically known as grid computing. Like mentioned in the question, this is a type of processor architecture in which various computer resources are combines from different domains in order to work together towards a common main objective. Which is exactly what SETI has done by using many individual's computers to essentially create one supercomputer capable of handling all the data.

6 0
3 years ago
Other questions:
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • What is the name of the organization responsible for assigning public ip​ addresses?
    13·1 answer
  • Advancement in technology is making peripherals...
    5·2 answers
  • What part of a file name does windows use to know which application to open to manage the file?
    13·2 answers
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are
    7·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • What is a feature of Print Preview? Fit to Document Fit to Margin Fit to Page Fit to Size
    5·2 answers
  • Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
    14·1 answer
  • 2.3 Code Practice: Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!