1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
6

Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne

d that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet.
What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

A. SSH
B. VPN
C. IMEI
D. POP3
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
4 0

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

You might be interested in
Can you guess why some of the nodes would still have statically assigned ip addresses?
LiRa [457]

<span>The manual assignment of an IP address to a system is called static addressing. Since the assignment of IP has been entered manually using ARP utility, the network administrators probably forgot to remove the manually configured nodes with IP addresses.  </span>

7 0
3 years ago
Which examples demonstrate common education and qualifications for Manufacturing Production Process Development careers? Check a
Tom [10]

Answer:

The answer is D "Latisha is a Mechanical Engineer with a bachelor's degree"

Explanation:

Workers in Manufacturing Production Process Development are liable for designing plan and plan of the manufacturing process. They work with clients to guarantee the manufacturing process delivers an item that meets or surpasses client expectations. Manufacturing Production Process Development is one of the many career paths in the Manufacturing Industry. Laborers in this Profession Way are liable for fundamental item plans and the plan of the manufacturing process itself. They should reliably draw in with their client to guarantee they produce an item that precisely coordinates their client's necessities. Occupations in this Profession Way incorporate Electrical and Electronic Drafters, Modern Designing Technologists, Assembling Creation Professionals, and Atomic Checking Specialists.

3 0
3 years ago
Read 2 more answers
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
Cómo se llaman los robots que se utilizan para la exploración espacial, en medicina, en la industria, en la agricultura, los que
Andrews [41]

La respuesta correcta para esta pregunta abierta es la siguiente.

Olvidaste incluir las opciones o los incisos que contienen las respuestas.

No obstante, con la idea de poder ayudarte hicimos una investigación y te podemos compartir lo siguiente.

Los robots que se utilizan para la exploración espacial, en medicina, en la industria, en la agricultura, los que se utilizan en el hogar se llaman "espacial, médico, industrial, agrícola, y doméstico."

Estos son los tipos de robots que ya se encuentran en la mayoría de empresas e industrias de nuestros países.

La robótica se empieza a adueñar de los trabajos que antes solamente podían realizar los seres humanos. Hoy en día, los trabajadores se ven desplazados de sus empleos porque la tecnología llegó para quedarse. Esto se ve claramente en las plantas armadores industriales que están llenos de robots que realizan funciones robotizadas.

De igual manera, los artículos electrodomésticos y la tecnología digital está haciendo uso de inteligencia artificial para eficientar las funciones del hogar.

6 0
3 years ago
What sort of negative outcomes are possible for this type of risk?
Harlamova29_29 [7]
More details please?
6 0
3 years ago
Read 2 more answers
Other questions:
  • All web traffic is based on the ____________________ protocol.
    14·1 answer
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • What happens when your computer is in hibernate mode??
    13·2 answers
  • What is the biggest difference between technical communication and the other kinds of writing you have done?
    13·1 answer
  • Which of the following code segments does not contain any errors?
    7·1 answer
  • As a student, why do you need to know and follow the steps printing a <br><br>document?​
    6·2 answers
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
    15·1 answer
  • What is the purpose of a project overview?
    8·2 answers
  • i was wondering if anybody would have a season 1 or 2 or 3 Fortnight account they never use and was gonna ask if i could play on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!