1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
6

Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his c

ompany uses. Which of the following protocols could he rule out as options for this connection?
a. IKEv2
b. TFTP
c. L2TP
d. GRE
Computers and Technology
1 answer:
Allushta [10]3 years ago
3 0

Answer:

The protocols that Will could rule out as options for this connection are:

b. TFTP

d. GRE

Explanation:

A virtual private network (VPN) delivers encrypted connection over the Internet to prevent unauthorized data access, thereby facilitating remote work and the transmission of sensitive data.

IKEv2 (Internet Key Exchange version 2) and Layer Two Tunneling Protocol (L2TP) are secure encryption protocols that enable virtual private network (VPN).

 

Trivial File Transfer Protocol (TFTP) is not encrypted for receiving and sending files but a simple boot-loading File Transfer Protocol.

Generic routing encapsulation (GRE) tunnels do not encrypt data and are not secure unless used with other secure tunnelling protocols.

You might be interested in
What does the octal number 362 represent in the decimal system?
kykrilka [37]
The answer is E. 242
8 0
3 years ago
I need some helpppppppppopoppppppppp
Yuri [45]

Answer:

Adding images: picture drawing box and insert tab

Formatting images: crop and picture styles

Explanation:

picture drawing box and insert tab would be options to add images

formatting (or editing) the images would be crop, and picture styles

4 0
3 years ago
Read 2 more answers
What does a program do when it needs to read a file?
Alja [10]
Hello <span>Quinshayewilli7701 </span>

Question: What does a program do when it needs to read a file?<span>
Answer: It goes the address area, which is the front of the hard drive with the links to the areas on the hard drive where the file is located.

Hope This helps
-Chris</span>
5 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
4 years ago
"A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to
Alexeev081 [22]

Answer: A central wireless access point (AP)

Explanation:

A central wireless access point (WAP) is a hardware device which can be configured on a local area network connecting WLAN to the wired network.

These APs have built in routers which enables wireless devices to connect with it. Mostly they are hardwired to devices such as in network switches or modems.

These access points are found in many institutions, organisations, enterprises which enables devices to be connected to them and provides access to the internet and resources.

There are also public access points which enables people travelling by public transport to connect through them and in many business organisation there are closed APs for use only by the employees of them which enables file sharing and information processing.

7 0
3 years ago
Other questions:
  • 2. Because technology is always changing, there are new applications being developed constantly. (1 point)
    9·2 answers
  • What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
    9·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • Advantages and disadvantages of using the command-line interface to manage files and folders
    14·1 answer
  • Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
    10·1 answer
  • WILL MARK BRAINLIEST!!!!!!!!!!!
    13·2 answers
  • Which software documentation guideline did the IEEE establish?
    10·1 answer
  • What is the difference between a master device in a Bluetooth network and a base station in an 802.11 network?
    13·1 answer
  • Pls help me computer science discoveries
    5·1 answer
  • [80 points] Fill in the missing word.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!