1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
6

Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne

d that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet.
What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

A. SSH
B. VPN
C. IMEI
D. POP3
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
4 0

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

You might be interested in
A picture drawn in 3 d is called?​
Varvara68 [4.7K]

Answer:

autostereogram

Explanation:

that^

6 0
3 years ago
Read 2 more answers
Um?<br><br> i went to check my questions and i found this-
asambeis [7]

Answer:

just go ahead and refresh the page

Explanation:

5 0
3 years ago
What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist
Volgvan

Answer:

the answer is  a)

Explanation:

4 0
3 years ago
Read 2 more answers
Please tell fast plzzzzzz.​
lana [24]

Answer:

True

Explanation:

4 0
3 years ago
If an investigator finds a computer that is turned off during a search with a warrant, the investigator should:___________.
cluponka [151]

Answer:

B. leave the computer turned off.

Explanation:

8 0
4 years ago
Other questions:
  • Which of the following is an advantage of using proprietary licensed software? The software’s source code can be easily modified
    7·2 answers
  • A pointing device controls the movement of the ____.
    15·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • XYZ Corp.’s facilities in Nashua, New Hampshire, are two office buildings 400 feet apart, each with its own LAN. To connect the
    9·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • Effective scrum masters apply which coaching behavior
    5·1 answer
  • E Highlight
    6·1 answer
  • PLZZZ HELP!!!!!!!
    12·1 answer
  • I have a problem. I can't cycle between game packs on my strike pack, I've watched so many vids I'm on Xböx and I'm holding the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!