1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
11

which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst

ation connected to the LAN?
Computers and Technology
1 answer:
Ugo [173]3 years ago
7 0

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

You might be interested in
Which XXX will prompt the user to enter a value greater than 10, until a value that is greater than 10 is actually input?
aleksley [76]

Answer:

b. (userInput < 10)

Explanation:

The piece of code that will accomplish this would be (userInput < 10). The code will first ask the user to "Enter a number greater than 10:" then it will compare the value of userInput to 10, if it is less than 10 it will redo the loop over and over again until the userInput is greater than 10. Once the userInput is greater than 10 it will break out of the do-while loop and continue whatever code is written under and outside the do-while loop

4 0
3 years ago
What is the first step you should take when you want to open a savings account?
pav-90 [236]
 First Go to the bank
Second Present Photo ID
 third Fill out application

I would think review the different savings account options that your bank offers...

Last Make initial deposit.



Hope that helps!!!

.
5 0
3 years ago
Amy, a project manager, needs to make a plan that ensures consistent delivery of the right message to the right people at the ri
AleksAgata [21]
I would have to say the answer is D.) A communication plan. Hope this helps! :-)
7 0
3 years ago
Consider the playGame procedure below which calls on 3 other procedures: countFives, player1Move, and player2Move.
emmasim [6.3K]

Answer:

c. RETURN (count)

Explanation:

A typical return statement performs the function of terminating the execution of a function and returns control to the calling function.

Hence, there will execution resumed in the calling function at the point immediately following the call.

Another thing a return statement can do is to also return a value to the calling function.

The code RETURN (count) will

terminating the execution of a function and returns control to the calling function.

3 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Other questions:
  • A list of the slides in a presentation is found here.
    7·2 answers
  • Why is Market Equilibrium unique and important?
    13·1 answer
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • What will be displayed after the following statements execute? int funny = 7, serious = 15; funny = serious 2; if (funny != 1) f
    7·2 answers
  • Send the memes whoever is the best will get that crown thing lol
    10·2 answers
  • Consider the following code segment. The code is intended to read nonnegative numbers and compute their product until a negative
    11·1 answer
  • Describe how pseudocode makes programming more efficient for large programming tasks.
    10·2 answers
  • The simple mixture of flour and water​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!