1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
4

A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections

to secure the server from getting compromised by a hacker? Check all that apply.
Computers and Technology
1 answer:
Vsevolod [243]3 years ago
7 0

Answer:

Secure firewall , Access Control Lists (ACLs) , and Bastion hosts

Explanation:

In this scenario, the best options to be able to accomplish this would be a Secure firewall , Access Control Lists (ACLs) , and Bastion hosts. A secure firewall and an access control list will prevent specific harmful files and computers from entering a network unless it has the proper clearance. A bastion host on the other hand is a special-purpose computer on a network specifically designed and configured to withstand attacks, acting as a secondary defense mechanism.

You might be interested in
A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
Elden [556K]

Answer:

The answer is "node".

Explanation:

The network address is known as a logical or physical address, which defines a networking module/device from a network. It is an allocated numerical number, to every device requiring access to the list or is a member of it.

  • In network communication, it uses the nodes for store data, and there address, these addresses are described by the unique numbers.
  • These node stores data packets, which stores encrypted data.  
7 0
4 years ago
A(n)___ is divided into rows and columns.<br> What goes in the blank?
Ber [7]
A spreadsheet consists of rows and colums
8 0
3 years ago
Why would a brokered CD pay more than a regular CD?
Lana71 [14]

Brokered CDs may have higher or lower rates than those purchased directly from bans and credit unions. The general consensus here is that higher rates are usually available for direct purchases.

3 0
3 years ago
True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
Alika [10]

your correct answer is true

5 0
3 years ago
Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
wolverine [178]

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

4 0
3 years ago
Other questions:
  • An employee wants to create a fake employee identification number as part of a fraud scheme. Which of the following controls wou
    15·1 answer
  • Create a cell reference in a formula by typing in the cell name or
    7·2 answers
  • You can change the location of the layers panel on the screen by _____ .
    7·1 answer
  • Which of the following is not a protocal? <br><br>A) HTTP<br>B) FTP<br>C) WWW<br>D) HTTPS​
    15·2 answers
  • Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network.
    15·1 answer
  • Value of 3.0+4.0×6.0​
    14·1 answer
  • What determines the number of times that a condition-controlled loop will repeat?
    9·2 answers
  • HURRY 50 POINTS A human is needed to create the algorithms that computers use.<br> True<br> False
    14·2 answers
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • why are microphones or digital cameras unlikely to cause the damage that is found in repetitive strain injury?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!