1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
7

A network technician is designing a network for a small company. The network technician needs to implement an email server and w

eb server that will be accessed by both internal employees and external customers. Which of the following would BEST secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.
B. Implementing a DMZ segment for the server
C. Implementing NAT addressing for the servers
D. Implementing a sandbox to contain the servers
Computers and Technology
1 answer:
777dan777 [17]3 years ago
5 0

Answer:

(B) Implementing a DMZ segment for the servers

Explanation:

DMZ is the short form for Demilitarized Zone. It is the temporary storage between an internal or private LAN and the public Internet. The main purpose of the DMZ is to give additional layer of security to a company's LAN (Local Area Network).

Once there are services to be provided to users on the public Internet, such services should be added to the DMZ. A few services that are worth implementing a DMZ segment for are;

i. Email servers

ii. Web servers

iii. Proxy servers

iv. FTP servers

You might be interested in
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
I need help, help me please ..​
Leona [35]

Answer:

1. cookies

2.domain name

3.web browser as web saver name

4.html

Explanation:

sana makatulong

4 0
4 years ago
Help pls nnnnnnnnnnnnnnnnnnnn
kiruha [24]

Answer:

3rd choice

Explanation:

i did that yesterday

5 0
3 years ago
With,user receive recommendations for items that are similar in type to items they already like.
Dennis_Churaev [7]

Answer:

Collaborative filtering

Explanation:

This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.

6 0
3 years ago
After Lola gave her friend the password to a protected website, her friend was able to remember it only long enough to type it i
Naily [24]

Answer:

Short term memory

Explanation:

Is the capacity an individual has to hold on to a small amount of information for a short period of time without altering it, it is used to remember information like phone numbers, passwords etc. It is also known as primary or active memory.

If short time memories is not rehearsed, they don't last and are easily forgotten, they actually last for about 20-30 seconds.

Aspects of short term memory :

1. Limited capacity : in a short term memory at most 7 items can be stored at a time.

2. Limited capacity : information is short lived and can be lost through distraction and with time.

3. Encoding.

4 0
4 years ago
Other questions:
  • which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution
    15·2 answers
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • Output from the print statement is usually written to the ______ in the form of ________
    6·1 answer
  • Space management is a<br> driving method.<br> A. lazy<br> B. defensive<br> C. fast
    14·1 answer
  • What is an internt?​
    10·1 answer
  • In the Microsoft Office Suite, what tells a database what to insert information in the document? 
    8·1 answer
  • PLTW activity 2.1.5 PLEASE HELP I NEED STEP 5<br> FAKE ANSWER WILL NOT BE GIVEN POINTS
    14·1 answer
  • Copying materials from a source text without using is<br> considered plagiarism<br> ?
    5·1 answer
  • You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!