1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
5

A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s

erve requests to users who are connecting to your web server. What type of network area or zone should be set up?
1. DMZ
2. Extranet
3. FTP
4. VPN
Computers and Technology
1 answer:
andreev551 [17]3 years ago
3 0

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

You might be interested in
Computer are most wonderful creation of 21st century how ?​
son4ous [18]

Answer:

It can do all the functions at a speedy rate and also helps us to search and progress in our homes and businesses. A computer can therefore be called a calculator with a twist for not only does it perform fast calculations, but it also has other special characteristics.

Explanation:

hope it helps you

6 0
2 years ago
Describe the conventional method of data processing​
andreyandreev [35.5K]

Answer:

The data processing is broadly divided into 6 basic steps as Data collection, storage of data, Sorting of data, Processing of data, Data analysis, Data presentation, and conclusions. There are mainly three methods used to process that are Manual, Mechanical, and Electronic.

4 0
3 years ago
Read 2 more answers
What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the
Sonbull [250]

Answer:

Live file system

Explanation:

The live file system allows you to continue adding files to CD or DVD disc after an initial burn as long as there is enough space left on the disc.

In an attempt to burn files on a CD or DVD disc, Windows will prompt you if you want the live file system or the other (which is mastered disc format). Once you select the live file system, you can then keep adding files over and over until there is not enough space on the disc.

Note that Windows might not display the prompt as "live file system". It could be represented in some other ways like: "Like a USB flash drive". But then going through the prompt will tell you which is which.

3 0
3 years ago
Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
pentagon [3]

Answer:

E. Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

Explanation:

The cisco ios is the operating system of any cisci network device. It is a command line interface used to configure these cisco devices.

The privilege user command "show running-config" in the command line interface is used to show the current configuration on the RAM of the router.

There are two ways to protect the router's console line with a password, with enable secret and enble password. The "enable secret" is a slightly encrypted password but the "enable password" has no encryption. These password methods are used to secure any channel to the router.

The "service password-encryption" command is used to encrypt all the passwords in the current configuration, to prevent attackers or unauthorized users from getting to the router.

7 0
4 years ago
How do you change your brainly lvl, it says I'm in collage but I'm in 8th grade :(
olga2289 [7]

Answer:

Awww

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • If the polar bear were taken out of the food chain what would happen to the seal population
    10·1 answer
  • A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
    11·1 answer
  • Within a table, the intersection of a row and a column creates a(n) ____.
    13·1 answer
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • What is the correct html element for playing audio files?
    11·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser o
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!