1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
6

In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a _______

__________________, which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites.
Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
7 0

Answer:

Demilitarized Zone - DMZ -

Explanation:

A Demilitarized Zone - DMZ - is a subzone or also known as a "screened sub network". This is a physical or logical subnet in charge of  detaching the Local Area Network from other potentially risky and untrusted networks. In such a case, the location for external-facing networks and resources is the DMZ. The main purpose of DMZ is to protect the internal LAN from external access, so restrictions are set for cybercriminals or unauthorized personnel and they are not able to access any data via Internet.

You might be interested in
Elena is starting a new nonprofit organization that provides professional-looking clothes for women who need to go on job interv
frutty [35]

Answer:

Excel is a multipurpose program that is useful in many different ways and not just in payroll. It has uses from Accounting to scientific research and everything in-between.

Elena might not need it for payroll but there are other ways to use Excel such as:

  • Database of Donor details - Elena can use Excel to keep a list of the businesspeople who donate their old clothes to the organization. She can also add details to these names such as when they donated, the frequency at which they have donated, what they donated and the like. The donor details will therefore be organized such that information on donors can be easy to acquire for whatever reason it is needed for.
  • Inventory - Excel can be used to keep an inventory list of the clothes that the organization has in stock. This will enable them better serve those they want to help as well as ensuring accountability in the workplace. A well kept inventory list will enable all sorts of analysis to be carried out such as which types of clothes are most in stock, which clothes are needed, which clothes are preferred and the like.
3 0
3 years ago
Mightier than the waves of the sea is his love for you
Inessa05 [86]

cool but kinda creepy ngl

8 0
3 years ago
Which heat transfer can be described as currents of warm air rising and cool air falling
erik [133]
Convection would be the answer to thisssss

3 0
4 years ago
You can't cite Wikipedia, what are three ways that you can use it for your research?
Vlada [557]

Answer:

Scan over the article for references/resources, find general information about your topic, find keywords and terms you can use for further searching.

Explanation:

8 0
3 years ago
Identify two areas of science or technology that make your life easier, safer, or otherwise better than your grandparents lives
vladimir2022 [97]
Heres some:

Quantum computing
Machine Learning
Medicine
Aeronautical Engineering (Drones, better transportation)
8 0
3 years ago
Other questions:
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • What is ‘Black-Box’ testing?
    14·1 answer
  • A palindrome is a word or a phrase that is the same when read both forward and backward. Examples are: "bob," "sees," or "never
    7·1 answer
  • Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to rese
    6·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • 1. Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of studen
    8·1 answer
  • Which of the following are features of the HTTPS protocol?
    12·1 answer
  • How much time does a computer take to big calculations ?​
    15·1 answer
  • How communication skills are different from self management skills
    10·2 answers
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!