1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
4 years ago
7

1. A systems administrator has installed a new UTM that is capable of inspecting SSL/TLS traffic for malicious payloads. All inb

ound network traffic coming from the internet and terminating on the company's secure web servers must be inspected. Which of the following configurations would best support this requirement?
A. The web servers’ CA full certificate chain must be installed on the UTM
B. The UTM’s certificate pair must be installed on the web servers
C. The web servers’ privet certificate must be installed on the UTM
D. The UTM and web server must use the same certificate authority
2. A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality?
A. Privileged accounts
B. Password reuse restrictions
C. Password complexity requirements
D. Password history
E. Password recovery
F. Account disablement
Computers and Technology
1 answer:
Brums [2.3K]4 years ago
8 0

Answer:

1 Option(A) is the correct answer .

2 Option(A) and Option(B) is the correct answer .

Explanation:

1

In this the administrator of the system built the new UTM capable of reviewing the  SSL / TLS flow for the suspicious payloads it see that the both inbound traffic flow originating from both the web and stopping on protected application server of the business .The full CA certificate sequence of web servers should be built on a UTM configuration will solve the problem .

2

The Two-factor authentication is used for the security purpose .In this technique only authorized people will accessing the data  the unauthorized people is not accessing the data.

  • The main objective of  two-factor authentication it provide the better security then the other security .
  • The  Two-factor authentication is ensuring the security of Privileged accounts as well as the reuse restrictions of the password
You might be interested in
Which type of network topology is the most common and easiest to use?
Airida [17]
<span>A network layout or topology that is the most common, the most simple and easiest to use out of the four network topologies is the Bus topology, one cable is used for installation so it is also the cheapest network type.</span>
5 0
4 years ago
when I was playing Mobile legends bang bang online Match The game logged Me out and when I was Trying To reconnect it failed and
Helen [10]

Answer:

it's most prolly a bug.The game crashes a lot tbh

5 0
3 years ago
Why is it good to be a computer programmer?​
liubo4ka [24]

Answer:

It's your wish become other professions like doctor, engineer are also good. But in this profession you can make apps, websites and can do hacking. Which is are cool things to do. But every profession is best at it's profession.

Explanation:

If you like my answer than please mark me brainliest

5 0
2 years ago
One property of light that makes it possible to record the image of an object with the camera
KengaRu [80]

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

7 0
3 years ago
ven int variables k and total that have already been declared, use a while loop to compute the sum of the squares of the first 5
monitta

Answer:

Following are statement is given below

int  k=1,total=0; // variable declaration

while(k<50) // iterating the while loop

{

   total=total+k*k;//  calculating the square

   k=k+1; // increments the value of k by 1    

}

Explanation:

Following are the description of Statement.

  • Declared a variable "total" and "k" of the "integer " type initialized the total to 0 and "k" to 1.
  • Iterating the while loop for less then 50 .In this loop, we calculating the sum of square of first 50 number in the "total" variable .
  • After that increment the value of "k" variable by 1 to execute the loop less then 50 .

3 0
3 years ago
Other questions:
  • Which option organizes tasks based on importance?
    12·1 answer
  • The _____ element, a hypertext markup language (html) metadata element, contains a collection of metadata elements that describe
    11·2 answers
  • Read the paragraph.
    12·2 answers
  • In the Word 2016 window, where is the Status bar located?
    8·1 answer
  • Please help me complete this task for ICT! Its about Hardware and Software
    12·1 answer
  • What could be a summary sentence or phrase that captures your writing experience?
    11·1 answer
  • Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
    6·1 answer
  • Write a program that represents a popular kid’s toy that teaches them about different shapes and colors.
    14·1 answer
  • What does input allow a computer to do
    14·1 answer
  • What three best practices can help defend against social engineering attacks?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!