1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
11

The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli

ents, the architects must visit several job sites per day. To share and send sensitive project/client information back to the office or with clients, the employees dial into the IPSec-based VPN remotely. For classified proprietary information, two separate extranets were set up with partners in the engineering firm on a server housed inside the office.
What firewall setup would provide the firm both flexibility and security? Justify your response.
Computers and Technology
1 answer:
maks197457 [2]3 years ago
4 0

Answer:

Check the explanation

Explanation:

IPSec-based VPN is configured in two different modes namely

IPSec Tunnel mode and IPSec Transport mode so here we are using IPsec transport mode which is used for end to end communications between a client and a server in this original IP header is remain intact except the IP protocol field is changed and the original protocol field value is saved in the IPSec trailer to be restored when the packet is decrypted on the other side due to this arrangement you need to use application based firewall because there are certain specific rules that can address the particular field (explained above-change in IP protocol field) which at the other end need to be same so at the type of decryption, original IP protocol field can be matched.

You might be interested in
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
This whole page needs to be done please help?
ira [324]

Answer:

F, T, F

C. A. C. D. B

that is just it

brainliest please ;)

6 0
3 years ago
Josie, your best friend, is having a huge Sweet Sixteen party. She has designated you to address all 100 of the envelopes (using
marysya [2.9K]

You add all the addresses into excel and and do mail-merge with the invitation. Adding the 100 addresses is probably a lengthy process but once this is complete you can just add on addresses and once a year or whenever you have to mail something to everyone, it's  a only mouse-click.

4 0
4 years ago
Which of the operating systems listed below was the last to be released
Elena-2011 [213]

Mac OS came out in 2001. This is software that was created by Apple to run the "Mac Computers." This software is still used to this day.

MS-DOS came out in 1981. This is software that was created by Microsoft to run x86 computers. This software is no longer used.

Windows New Technology came out in 1985. This is software that was created by Microsoft to run a ton of different computers. This software is still used to this day.

Windows Vista came out in 2006. This software that was created by Microsoft to run a variety of personal computers. This software is no longer used.

By the information given, Windows Vista was the last to be released.

Best of Luck!

8 0
3 years ago
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
muminat

Answer: I think it’s D

Explanation: the rest apply to the the rules of 1NF and 2NF

5 0
3 years ago
Other questions:
  • How many bits do you need to count up to 30 help please
    14·1 answer
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
    11·1 answer
  • The expression that is tested by a switch statement must have a(n) __________ value.
    12·1 answer
  • Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
    14·1 answer
  • Machu Picchu is located in modern day _______<br><br>​
    14·2 answers
  • 9.
    15·1 answer
  • PLZZZZ help will give brainlest
    5·1 answer
  • Which command tells the for loop what to count by?
    9·2 answers
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!