1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
5

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the

malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Computers and Technology
1 answer:
mars1129 [50]3 years ago
6 0

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

You might be interested in
Define CPU and its functions​
Maslowich

<u>Central processing unit (CPU)</u>

functions :-

  • <u>CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.</u>

6 0
2 years ago
Read 2 more answers
andy accidentally saved a file in the wrong folder. what is the quickest way to move the file? create a new file and save it in
Kruka [31]

take the improper folder to the proper place. but if that don't work if you have a copy of it then copy paste it to always be sure to have a backup

and sans said have this picture∵

                                                -

8 0
3 years ago
Read 2 more answers
What would be one duty of a network administrator
gulaghasi [49]

Answer:

designing the computer network

Explanation:

8 0
3 years ago
Search engine ranking evaluates the variables that search engines use to determine where a URL appears on the list of search res
VARVARA [1.3K]

Answer:

True.

Explanation:

Search engines are evaluated on the basis of the variables which are used by the search engines to determine where the URL appears in the list of the search results.There are certain algorithms are also implemented using these variables like panda algorithm.So we conclude that the answer is True.

3 0
3 years ago
Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
Leona [35]

Answer:

C

Explanation:

Both Table and Format as Table can be used to create a table

4 0
3 years ago
Other questions:
  • Which type of topology describes the physical arrangement, installation, and connection of cables, computer, and other devices?
    10·2 answers
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • What characters cannot be used in a filename?
    15·1 answer
  • Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a
    13·1 answer
  • Let's go! About to hit 40k!!! Glad to help on Brainly®!!!
    11·1 answer
  • One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F
    14·2 answers
  • 12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the
    8·1 answer
  • When should you stop where you are, drop to the
    11·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
  • Which of the following is an example of two-factor authentication?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!