1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
11

The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli

ents, the architects must visit several job sites per day. To share and send sensitive project/client information back to the office or with clients, the employees dial into the IPSec-based VPN remotely. For classified proprietary information, two separate extranets were set up with partners in the engineering firm on a server housed inside the office.
What firewall setup would provide the firm both flexibility and security? Justify your response.
Computers and Technology
1 answer:
maks197457 [2]3 years ago
4 0

Answer:

Check the explanation

Explanation:

IPSec-based VPN is configured in two different modes namely

IPSec Tunnel mode and IPSec Transport mode so here we are using IPsec transport mode which is used for end to end communications between a client and a server in this original IP header is remain intact except the IP protocol field is changed and the original protocol field value is saved in the IPSec trailer to be restored when the packet is decrypted on the other side due to this arrangement you need to use application based firewall because there are certain specific rules that can address the particular field (explained above-change in IP protocol field) which at the other end need to be same so at the type of decryption, original IP protocol field can be matched.

You might be interested in
Notes on secondary memory​
gladu [14]

Answer:

non-volatile and persistent in nature

7 0
3 years ago
You will use the Word application to design, develop, and create a business letter to potential clients of your new business. Th
LUCKY_DIMON [66]

Answer:

Mail Merge Data Source

Explanation:

7 0
3 years ago
Difference between Computer safety practices and precautions
nika2105 [10]

Answer: This is a partial list of basic safety precautions to use when working on a computer: Remove your watch and jewelry and secure loose clothing. Turn off the power and unplug equipment before performing service. Cover sharp edges inside the computer case with tape. Never open a power supply or a CRT monitor.

Make sure the space underneath your desk is free from clutter and your legs have room to move. Use your mouse as close to the keyboard as possible. Adopt good posture while at the computer. Know how to adjust your chair to the most comfortable position.

4 0
2 years ago
Six external parts of a computer system, which are output and which are input devices.
Zigmanuir [339]
1. The keyboard is an example of an input device.
2. A mouse is an example of an input device.
3. Display Monitors are examples of output devices as they display information.4. Audio speakers are examples of output devices.5. Headsets with microphones are an example of both an input and output device as they allow sound to be inputted and receive sound.6. Printer/Printer scanner. A printer would be an example of an output device, however, a printer scanner combination would be both input and output.

3 0
3 years ago
The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
Zielflug [23.3K]

Answer:

code reviewer

Explanation:

In this scenario, the project manager should advertise for a code reviewer. Usually a development team has at least 2 code reviewers that are very familiar with the code that is being written for the project. Once sections of code have been completed it is usually the case that both the project lead and a code reviewer both review the entire software to look for bugs and note improvements that can be made to make the code more efficient.

4 0
3 years ago
Other questions:
  • Which are characteristics of pseudocode? Select all that apply.
    6·1 answer
  • Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
    15·1 answer
  • Directory servers from different vendors are synchronized through ________.
    9·1 answer
  • Suppose that a system uses 32-bit memory words and its memory is built from 16 1M × 16 RAM chips. How large, in words, is the me
    11·1 answer
  • For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
    6·1 answer
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • What is an elliptic curve cryptosystem (ECC)?
    8·1 answer
  • 1
    13·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!