1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
5

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the

malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Computers and Technology
1 answer:
mars1129 [50]3 years ago
6 0

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

You might be interested in
What is the advantage of video conferecing
Svet_ta [14]

some advantages of video conferencing include:

• you can talk no matter how far you are from the person

•you won’t have to go somewhere to talk

•there is no cost if you need to travel far

7 0
3 years ago
Read 2 more answers
The sum of the deviations of each data value from this measure of central location will always be zero. A. Median B. Standard de
JulijaS [17]

Answer:

C. Mean

Explanation:

Mean = (∑x_{i})/N

Median = central values when data is sorted

Mode = most repeated value

Standard deviation = \sqrt{sum(x_{i}-mean)^{2}/N}

In standard deviation, formula you may see that deviation is being calculated from the mean (central location). But here we take square of the value before adding all of them.

But if we just take sum(x - mean), it would be equal to zero.

<u>EXAMPLE</u>

Take 4, 9, 5 as data

mean = (4+9+5)/3 = 18/3 = 6

sum of deviations from mean = (4-6)+(9-6)+(5-6) = (-2)+(3)+(-1) = 0

8 0
3 years ago
Read 2 more answers
During the design phase, development teams translate the requirements into?
Ludmilka [50]
A design for the software application
7 0
3 years ago
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
2 years ago
An aggregate function is _____. A. a function that calculates a statistic such as a subtotal or average B. a mathematical expres
Murrr4er [49]

Answer:

  • A. a function that calculates a statistic such as a subtotal or average.

6 0
2 years ago
Other questions:
  • OSHA requires that employers pay for most required personal protective equipment (PPE), including: A. Hard hats B. Logging boots
    5·1 answer
  • When reading a ____ language, we use our understanding of the richness of the language's vocabulary to extract the meaning. geop
    10·1 answer
  • Ryan is working on the layout of his web page. He needs to figure out where the title, links, text, and images should go. Which
    15·2 answers
  • In computers, when the print command is executed, a cable carries this signal from the computer to the printer. In comparing a c
    11·1 answer
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
    8·1 answer
  • What was the effect of the norman conquest on the language of britain?
    11·1 answer
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism
    15·1 answer
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • 5.7 AP-Style MC Practice edhessive
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!