1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
14

A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S

erver 2016. The administrator must make sure that all data is encrypted by using end-to-end encryption. In addition, instead of using user names and passwords, he needs to use computer-level authentication? What should he do?
Computers and Technology
1 answer:
LenaWriter [7]3 years ago
8 0

Answer:

The answer to this question can be given as:

To access the server, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

Explanation:

In this question, the user doesn't access the server by the User name and password. The User wants to access the server by the computer-level authentication. To access the server successfully user must Configure L2TP with IPsec and MS-CHAPv2. where L2TP with IPsec stands for Layer 2 Tunneling Protocol or it is also known as Virtual private network. It is a communications protocol that allows us to move data from one network to another in the encrypted form that is used by the IPsec. MS-CHAPv2 stands for Microsoft Challenge-Handshake Authentication Protocol that is developed by Microsoft. In computing, the CHAP provides the authentication to the user or network host entity. For example, this entity may be an internet service provider. And v2 stands for security.

So to access the server successfully, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

You might be interested in
Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
lisabon 2012 [21]

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

4 0
3 years ago
How do i divid 521 to the nearest tenth
Softa [21]

Answer:

520

Explanation:

take 521 round that to the nearest 10th and thats 520

8 0
4 years ago
Read 2 more answers
Typically, a dvd has how many times more capacity than a cd?
Marianna [84]
For a simple answer, it is aproximately 7 times more than a CD.
6 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
When preparing images to be used for different mediums print web and video in photoshop different file formats are required , se
Anika [276]
The answers are :
JPEG - Compresses well without losing quality, it should be used for the web
TIFF - Can be saved in an uncompressed file format with a high resolution, it is a common file format used for professional print services
BMP - Can be saved in a compressed or uncompressed file format, It is a common file format used for either web or print
<span>FLV or SWF - Used to publish a rendered video for use on the web</span>
5 0
3 years ago
Other questions:
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • What does it mean to empty the cache?
    6·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • List an example of application software used in spreadsheet​
    11·2 answers
  • Please help I’ll mark brainliest!
    12·2 answers
  • What is an insertion point?
    6·1 answer
  • Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capaci
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!