1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
4 years ago
14

A network technician has created a network consisting of an external internet connection, a DMZ,

Computers and Technology
1 answer:
Elden [556K]4 years ago
6 0

Answer:

B.The admin private network allowing only admin access.

Explanation:

When the network technician created the network that consists of an external internet connection ,an internal private network,an administrative network and a DMZ.All the routers and the switches should be configured so that they can accept SSH connections from the admin private network that allows only admin access.

You might be interested in
What is data. Explain it in brief
Olin [163]
Memory or Information stored in electronic devices. In computing, data is information has been translated into a form that is efficient for movement or processing.
3 0
4 years ago
Read 2 more answers
In a mission critical environment, performing maintenance operations on a host FIRST requires which of the following?
jonny [76]

Answer: (B) Migrating all VMs off the host.

Explanation:

  VMs migration is the virtual machine migration that basically change the workloads automatically in the system. The maintenance of the schedule results into the downtime in the server for users. In the mission critical environment, when we performing various types of maintenance operation on the host we first require migrate all the virtual machine.

 In the critical environment there is a chance that the data in the given host may be critical and the data in the virtual machine (VM) may be in critical position in the host.

5 0
3 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
4 years ago
An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c
Romashka [77]

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

8 0
3 years ago
3. What of the following is the main components of computer system?
Likurg_2 [28]

Answer:

CPU, input unit, Output unit, memory unit

3 0
2 years ago
Read 2 more answers
Other questions:
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • Which of the following consists of electronic components that store instructions?
    10·1 answer
  • True or False
    10·2 answers
  • In which of the following situations will a macro make your work more efficient?
    9·1 answer
  • What is a system unit
    7·1 answer
  • What is data Communications​
    11·2 answers
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!