1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
4 years ago
5

Several new projects are being staffed by outside contractors who will be working on servers in the contractors’ office, not in

the company building, and will have their own VPN server. The contracting company has informed your company that none of its people will be working weekends. What VPN controls can you set up to minimize contract employees’ access to your network?
Computers and Technology
2 answers:
jekas [21]4 years ago
8 0

Answer:

See explaination

Explanation:

In order for us to implement we can go through NAP provides an infrastructure to check client computer if they are trying to acess some network.

Generally it is very essential to take such steps to protect network health from external threats revoking acess to computer setting which deals with antivirus or anti spyware pacakage.

Simply you can define some policies for remove acess through NAP - enabled VPN servers.

By NAP enforcement client to request acess to network.

nikdorinn [45]4 years ago
6 0

Answer:

Check the explanation

Explanation:

To implement this we can go through configuring Network Access Protection (NAP) which provides an infrastructure to check client computers if they are trying to access some network.

Generally we are required to take such steps to protect network's health from external threats, i.e. revoking access to computer settings which deals with antivirus or anti-spyware packages.

Simply you can define some policies for remote access through NAP-enabled VPN servers, in other words you can enforce the clients. It is done by NAP enforcement client to request access to network.

You might be interested in
What are benefits of using debugging tools? Check all that apply.
vivado [14]

Answer:

It's

A. Debugging tools help programmers catch errors they might otherwise miss.

B. Debugging tools can save time.

D. Debugging tools help programmers make methodical assessments of the problem.

Explanation:

got it right on edge.

6 0
3 years ago
You decide to add 3 new hard drives to your computer so that you can increase the amount of storage one it when you install them
Tasya [4]

Answer:

b. Use a Molex to SATA power adapter.

Explanation:

SATA power connector is a 15 pin power connector that is used to connect many computer parts like hard drive, cd drive, SSD, etc.

Molex connector is an old connector that is used as a power connector instead of a SATA connector on the same devices.

But the SATA connector overcomes the Molex connectors as it is easy to use and easy to install and can widely be used in many peripherals.

But even now power supply of the computer contains the SATA power connector as well as some spare Molex connector, which can be used when required.  

There are many Molex to SATA connectors that are easy to use when there is a shortage of SATA power.

So, according to the scenario, the most appropriate answer is option b.

3 0
3 years ago
Software that functions as an electronic version of a filing cabinet?
Dennis_Churaev [7]

Answer: There are a lot of choices

Explanation: do you want a database? You can obtain a terabyte or even larger size thumb drive or USB drive

Do want a print server? a networked drive specific for your data and if you have  to   print out anything

Do you want a connected drive to send all your documents to with organized folders?  any size drive will work for this they come all prices

Enter the electronic filing system, sometimes called document management software. These computerized filing systems provide electronic file management. In other words, they give us a simple way to store, organize, and retrieve digital files and digital documents and pdfs.

https://www.filecenter.com/info-electronic-filing-system.html here is some good software

5 0
2 years ago
In order for a 2 Bit Computer, or 4 Bit Computer, or an 8 Bit Computer, or 16 Bit Computer, or 32 Bit Computer to process the ex
melisa1 [442]

Answer:

Check the explanation

Explanation:

• The 2-bit architecture is a microprocessor or computer architecture that has a datapath width or a highest operand width of 2 bits.

• These architectures typically have a matching register file with registers width of 2 bits. Very few 2-bit architecture CPUs were commercially marketed, mo. were bit-slice microprocessors.

4 bit computer:  

• In computer architecture, 4-bit integers, man°, addresses, or other data units are those that are 4 bits wide.

• 4-bit CPU and ALU architectures are those which are solely based on registers, address buses, or data buses of that size.

• A group of four bits is also called a nibble and has 2° = 16 possible values.

8 bit computer:

• In computer architecture, 8-bit integers, memo, addresses, or other data units are those that are 8 bits (1 octet) wide.

• 8-bit CPU and ALU architectures are those which are solely based on registers, address bums, or data be of that size.

• 8-bit is also a generation of microcomputers in which 8-bit microprocessors were the norm).

16 bit computer:  

• In computer architecture, 16-bit integers, memory addresses, or other data units are those that are 16 bits (2 octets) wide.

• 16-bit CPU and ALU architectures are those which are solely based on registers, address buses, or data bums of that size.

• 16-bit microcomputers are those type of computers in which 16-bit microprocessors were the norm.

32 bit computer:  

• In computer architecture, 32-bit integers, maim, addresses, or other data units are the that are 32 bits (4 octets) wide.

• 32-bit CPU and ALLI architectures are those which are solely based on registers, address buses, or data bums of that size.

• 132-bit microcomputers are those type of computers in which 32-bit microprocessors are the norm).

5 0
3 years ago
You've received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bi
Ad libitum [116K]

Assuming they all use the same basic algorithm, what might it be SHA-1.

c. SHA-1

<u>Explanation:</u>

As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods

MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature

SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.

3 0
3 years ago
Other questions:
  • Maurice has just purchased his first computer, which contains a preinstalled suite of basic software applications. He receives a
    8·2 answers
  • It is not possible to use keywords to search for themes
    5·1 answer
  • Which of the applications below is designed to help a user bypass enforced web filtering policies?
    15·1 answer
  • Does any body like animal jam
    11·2 answers
  • An inner drive to work hard and well is:
    10·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • You have read about the beginnings of the Internet and how it was created. What was the Internet originally created to do? (sele
    10·2 answers
  • In what ways can you sort data by using the sort procedure? Check all that apply.
    6·1 answer
  • Is data science the sexiest job in 21st century according to Harvard business review?
    13·1 answer
  • If we increase the sample rate of a device from 48khz to 96khz, what is the impact to the network?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!