1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
4 years ago
5

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the

malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Computers and Technology
1 answer:
mars1129 [50]4 years ago
6 0

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

You might be interested in
Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
Tema [17]

Answer:

Code is provided in the attachment form

Explanation:

Vector Multiplication code:

Vector_multiplication.c file contains C code.

See attachment no 1 attached below

Classification of Algorithm: For creating elements in vector c of size n, number of scalar  multiplications is equal to n. The size of original two vectors scales directly with the number of  operations. Hence, it is classified as O(n).

7 0
3 years ago
Does an android tablet have a hard drive
Kisachek [45]
No, it uses flash menory
3 0
4 years ago
Look at the graph. What is the meaning of the point shown with a star
RUDIKE [14]
The answer is B. 1 Box= 1/2 Pounds
4 0
3 years ago
Write the difference between:
JulsSmile [24]

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

3 0
4 years ago
Read 2 more answers
How do you put a picture when you ask a question?
Setler [38]

Answer:

there should be an option to attach an item. if not try pasting it

Explanation:

5 0
4 years ago
Read 2 more answers
Other questions:
  • Eye injuries usually occur as a result of all of the following things, EXCEPT:
    13·2 answers
  • D-H public key exchange Please calculate the key for both Alice and Bob.
    12·1 answer
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • What does Tristan need to do to add a row at the
    14·1 answer
  • What Are the main reasons students take the SAT/ACT?
    15·1 answer
  • Practice with CSS. a. Write the CSS for an HTML selector footer with the following characteristics: a light-blue background colo
    11·1 answer
  • Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
    14·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • The advantages and disadvantages of internet​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!