1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
14

A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S

erver 2016. The administrator must make sure that all data is encrypted by using end-to-end encryption. In addition, instead of using user names and passwords, he needs to use computer-level authentication? What should he do?
Computers and Technology
1 answer:
LenaWriter [7]3 years ago
8 0

Answer:

The answer to this question can be given as:

To access the server, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

Explanation:

In this question, the user doesn't access the server by the User name and password. The User wants to access the server by the computer-level authentication. To access the server successfully user must Configure L2TP with IPsec and MS-CHAPv2. where L2TP with IPsec stands for Layer 2 Tunneling Protocol or it is also known as Virtual private network. It is a communications protocol that allows us to move data from one network to another in the encrypted form that is used by the IPsec. MS-CHAPv2 stands for Microsoft Challenge-Handshake Authentication Protocol that is developed by Microsoft. In computing, the CHAP provides the authentication to the user or network host entity. For example, this entity may be an internet service provider. And v2 stands for security.

So to access the server successfully, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

You might be interested in
The expression that is tested by a switch statement must have a(n) __________ value.
Hitman42 [59]

The answer is relational.

6 0
4 years ago
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these
vampirchik [111]

Using the computational knowledge in python it is possible to write a code that uses the functions to make a  a prolog program to answer the following queries

<h3>Writting the code in python:</h3>

<em>valid([]).</em>

<em>valid([Head|Tail]) :-</em>

<em>fd_all_different(Head),</em>

<em>valid(Tail).</em>

<em />

<em>sudoku(Puzzle, Solution) :-</em>

<em>Solution = Puzzle,</em>

<em>Puzzle = [S11, S12, S13, S14,</em>

<em>S21, S22, S23, S24,</em>

<em>S31, S32, S33, S34,</em>

<em>S41, S42, S43, S44],</em>

<em />

<em>fd_domain(Solution, 1, 4),</em>

<em />

<em>Row1 = [S11, S12, S13, S14],</em>

<em>Row2 = [S21, S22, S23, S24],</em>

<em>Row3 = [S31, S32, S33, S34],</em>

<em>Row4 = [S41, S42, S43, S44],</em>

<em />

<em>Col1 = [S11, S21, S31, S41],</em>

<em>Col2 = [S12, S22, S32, S42],</em>

<em>Col3 = [S13, S23, S33, S43],</em>

<em>Col4 = [S14, S24, S34, S44],</em>

<em />

<em>Square1 = [S11, S12, S21, S22],</em>

<em>Square2 = [S13, S14, S23, S24],</em>

<em>Square3 = [S31, S32, S41, S42],</em>

<em>Square4 = [S33, S34, S43, S44],</em>

<em />

<em>valid([Row1, Row2, Row3, Row4,</em>

<em>Col1, Col2, Col3, Col4,</em>

<em>Square1, Square2, Square3, Square4]).</em>

<em />

<em>| ?- sudoku([_, 4, 3, 2,</em>

<em>3, _, _, _,</em>

<em>4, 1, _, _,</em>

<em>_, _, 4, 1],</em>

<em>Solution).</em>

<em>Solution = [1,4,3,2,3,2,1,4,4,1,2,3,2,3,4,1]</em>

<em>yes</em>

See more about python at brainly.com/question/18502436

#SPJ1

7 0
2 years ago
The purpose of project management is _____. executing a requirement improvement working toward a common goal completing a projec
Anna11 [10]

Answer:

working toward a common goal.

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement a project plan.

Furthermore, the main purpose of project management is working toward a common goal.

This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.

The fundamentals of Project Management which are universal across all fields and businesses includes;

1. Project initiation.

2. Project planning.

3. Project execution.

4. Monitoring and controlling of the project.

5. Adapting and closure of project.

In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.

3 0
3 years ago
Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
Alik [6]

array[0] = 2 * array[4];

5 0
3 years ago
Other questions:
  • Smartphones store their operating system software in ________.
    11·1 answer
  • Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
    13·1 answer
  • Hiding an object, such as a diary, to prevent others from finding it is an example of:______________.
    10·1 answer
  • Some drugs, like Tylenol, are available over the counter because they are safe in any dose.
    8·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • The data set monarch from Computer-Active Data Analysis by Lunn andMcNeil (1991) contains the years lived after inauguration,ele
    9·1 answer
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    14·1 answer
  • What is wrong with the following C++ code? How would you fix it? int sum; for (int i=0; i&lt;1000; ++i) sum += i; { printf("Sum
    5·1 answer
  • How are status reports useful
    6·1 answer
  • Why does my wifi keep disconnecting and reconnecting?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!