1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
5

A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s

erve requests to users who are connecting to your web server. What type of network area or zone should be set up?
1. DMZ
2. Extranet
3. FTP
4. VPN
Computers and Technology
1 answer:
andreev551 [17]3 years ago
3 0

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

You might be interested in
The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
V125BC [204]

Answer:

C. Works by merging two sorted vectors into one larger sorted vector

Explanation:

Merge sort is an efficient, general-purpose, comparison-based sorting algorithm.

Merge sort repeatedly breaks down a list into several sub-lists until each sublist consists of a single element and <em>merging</em> those sub-lists in a manner that results into a sorted list.

8 0
3 years ago
You have been asked to create an authentication security plan for your company. Which of the following components would you inco
Stolb23 [73]

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

5 0
3 years ago
If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
chubhunter [2.5K]

Answer: Should be NOT.

Explanation: NAND would make you get emails as long as they don't have both "new" and "advanced." NOR would make you only get emails that don't have "advanced" or "new.| AND would make you only get emails with both "new" and "advanced." XOR would make you get emails as it has either "new" or "advanced," but not if it has neither or both. So NOT new makes sense, because it'll return emails that don't have "new." Hope this helps.

7 0
3 years ago
Technological uncertainty:
Lisa [10]

Answer:

The correct answer is: "b. occurs because an alternative technology could be introduced by competitors".

Explanation:

It is very difficult to assess how technological uncertainty has been developed and maintained throughout the years, although it is possible to state that it may occurs when other alternative technologies are developed and launched, besides other factors. Technology companies and agencies are interested in developing their products as best as possible, therefore, competition increases with marketability and produces uncertainty among all developers, software and hardware engineers, and other Information Technology (IT) workers who are responsible for creating new technological tools which may solve the problem of uncertainty among them all and improve society.

(ps: mark as brainliest, please?!)

6 0
3 years ago
So i'm trying to figure out why this code wont run can anyone help me
MaRussiya [10]

Answer:

<em><u>use</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>ope</u></em><em><u>ning</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>cl</u></em><em><u>osing</u></em><em><u> </u></em><em><u>tags</u></em><em><u> </u></em>

<em><u>[</u></em><em><u>Tex]</u></em><em><u> </u></em><em><u>[</u></em><em><u>\</u></em><em><u>t</u></em><em><u>e</u></em><em><u>x</u></em><em><u>]</u></em><em><u> </u></em><em><u>ok</u></em>

8 0
3 years ago
Other questions:
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • Services such as water, electricity, and phone communications are called:
    7·1 answer
  • Point out the wrong statement:
    7·1 answer
  • Cora is writing a program to make a motorcycle racing game. If Cora wants the speed of the motorcycle to appear on the screen wh
    5·2 answers
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!