1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
4 years ago
5

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the

malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Computers and Technology
1 answer:
mars1129 [50]4 years ago
6 0

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

You might be interested in
Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording
devlian [24]

Full question attached

Answer and Explanation:

1. There’s need to ask for help and advice from people who have the

knowledge and skills in making a simple electrical gadget.

2. Adapter is used to plug appliances that are far from the main power source.

3. Do not touch the metal pipes while you are doing electrical repairs.

4. Shut off the power at the main switch or circuit breaker and unplug the equipment when working on electricity.

5. Pliers are tools used to grip, pull or cut electric wires.

From the above, we have corrected some of the errors that could be made in everyday home appliances or home electricity. In number 4, it is also worthy of note that shutting off power at the main switch will only require emergency situations otherwise we need only shut off the one for the problem circuit and leave the rest.

5 0
3 years ago
How is a website most likely to distinguish its different sections?
Jlenok [28]

Answer:

D. by using different background colors for different sections​

Explanation:

This can help people differentiate the different sections of your webpage.

Hope this helps!

4 0
3 years ago
Which of the following are techniques that companies use to influence consumers demand for their goods and services
Lesechka [4]
A. Turning luxuries into necessaties
5 0
3 years ago
Read 2 more answers
Why must an rodc be able to connect to at least one windows server 2008 or higher domain controller?
raketka [301]
<span>Ensure that at </span>least one<span> writable </span>DC<span> must be running </span>Windows Server 2008<span> or higher before you can deploy a Read-Only-Domain-Controller.</span>
6 0
3 years ago
A device which lets you interact with the computer
Gnoma [55]

Answer:

Input, output, storage.

Explanation:

Input is used to interact with, or send data to the computer (mouse, keyboards, etc.). Output provides output to the user from the computer (monitors, printers, etc.). And storage which stores data processed by the computer (hard drives, flash drives, etc.).

3 0
3 years ago
Read 2 more answers
Other questions:
  • In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
    9·1 answer
  • In general, what is the leftmost point of a circle with radius r centered at (x,y)?
    8·1 answer
  • What are some of the advantages of using the F measure (weighted harmonic mean) over using the Precision &amp; Recall when evalu
    15·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Exchanging which type of data uses the least bandwidth?
    7·2 answers
  • What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum &gt; 4) break; } whi
    8·2 answers
  • How are web design &amp; web development different from each other?
    9·1 answer
  • Learning Management Systems (LMS) allow students to interact with each other, but NOT their teachers.
    10·2 answers
  • If any one has mincraft on ps4 bedrock we can finish building a BIG city world all we need to put is a shop and money dispensers
    8·2 answers
  • True of false that the memory of laptop is normally measured in kilobytes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!