1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
9

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company n

etwork and is accessible from the Internet. Security personnel are concerned that the FTP server is compromised and is possibly being used as a platform to attack other company servers. What is the BEST way to mitigate this risk? (A) Add an outbound ACL to the firewall(B) Change the FTP server to a more secure SFTP.(C) Use the implicit deny of the firewall(D) Move the server to the DMZ of the firewall
Computers and Technology
1 answer:
USPshnik [31]3 years ago
4 0

Answer:

(D) Move the server to the DMZ of the firewall.

Explanation:

DMZ (demilitarized zone):-It is a logical or physical subnet that filters an internal LAN(Local area Network) from other networks that are not trusted.So by moving the server to the DMZ of the firewall is the best way to mitigate this kind of risk for the technician.

You might be interested in
The words that follow a code number in the cpt manual are called the
prohojiy [21]
 <span>The words that follow a code number in the CPT manual are called the: procedure/service descriptor. </span>
6 0
3 years ago
A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
disa [49]

Answer:

System image backup

Explanation:

A <em>System Image Backup</em> creates a backup image of your disk volume, including the Windows system files (C:\Windows), your system settings, programs, along with any personal files or documents stored on the disk volume. You can restore your computer from the backup image.

Therefore if a user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed, then she needs to have a system image backup

8 0
3 years ago
Will give brainliest
lapo4ka [179]

Answer:

a. energy

Explanation:

The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.

Hope this helped!!!

7 0
3 years ago
Python Programming
Phoenix [80]

The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:

<h3>Python Code</h3>

# Python program to create Bankaccount class

# with both a deposit() and a withdraw() function

class Bank_Account:

def __init__(self):

 self.balance=0

 print("Hello!!! Welcome to the Deposit & Withdrawal Machine")

def deposit(self):

 amount=float(input("Enter amount to be Deposited: "))

 self.balance += amount

 print("\n Amount Deposited:",amount)

def withdraw(self):

 amount = float(input("Enter amount to be Withdrawn: "))

 if self.balance>=amount:

  self.balance-=amount

  print("\n You Withdrew:", amount)

 else:

  print("\n Insufficient balance ")

def display(self):

 print("\n Net Available Balance=",self.balance)

# Driver code

# creating an object of class

s = Bank_Account()

# Calling functions with that class object

deposit()

s.withdraw()

s.display()

Read more about python programming here:

brainly.com/question/26497128

#SPJ1

8 0
2 years ago
In a ___ traversal of a binary tree, you begin at the root and visit nodes one level at a time
svp [43]

Answer:

The answer of the given question is Inorder.

Explanation:

In the inorder traversal the binary tree start from the root and visited all the vertex in the tree .

The inorder follow the following Algorithm

1. Traverse in the left subtree.

2 Print the data (visit the node ).

3 Traverse in the Right subtree.

8 0
4 years ago
Other questions:
  • Which fingers do you use to type the following letters rtgvf
    11·1 answer
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • What is one example of technology influencing health​
    9·1 answer
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • Ng/ Computer Applications - Office 2016 - EL3520 A
    13·1 answer
  • Write a new program indent.cpp that enhances the program from the previous task. As it reads the input line by line, it should a
    10·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • Which memory will be suitable (a) to Run a software (b) to store a software permanently ?
    9·1 answer
  • Write a description of the photograph to someone who cannot see the photograph. Be sure to include the title of the photograph a
    5·1 answer
  • According to Okun's law, if the unemployment rate goes from 7% to 4%, what
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!