1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
12

Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't w

ork as well for travelling employees in locations with unreliable or no internet access. What steps could remote users take to keep access to important folders on the road?
Computers and Technology
1 answer:
Alona [7]3 years ago
6 0

Explanation:

Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.

Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.

You might be interested in
When we type there Is blue like thing blinking what's that called ​
taurus [48]

Answer:

a cursor? I think.

3 0
3 years ago
Read 2 more answers
What can you achieve by selecting Insert in the Table menu?
BARSIC [14]
You can add row, table, columns or cells
4 0
3 years ago
Read 2 more answers
What is the smallest group network
astra-53 [7]

LAN, MAN, MLAN, WAN, SAN, PAN ETC.

6 0
3 years ago
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traf
Sonja [21]

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7 0
3 years ago
The backbone networks of the Internet are typically owned by long-distance telephone companies called
Aneli [31]

Answer:

network service providers

Explanation:

The backbone networks of the Internet are typically owned by long-distance telephone companies called network service providers.

A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to small internet service providers.

5 0
3 years ago
Other questions:
  • Both the USB flash drive and the DVD are data storage devices, but they both have numerous differences. Both can contain insane
    6·1 answer
  • A bin contains 100 sty le a notebooks, 100 style b notebooks, and 100 style c notebooks. antoine will select 3 notebooks from th
    9·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • Which is a circuit board located behind an LCD screen on a laptop?
    7·1 answer
  • All computers perform disk optimization utilizing the same software.<br><br> true <br> false
    11·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • I AM GIVING BRAINLEST!!!!!!!!
    14·2 answers
  • Your job is to choose a data structure to implement polynomials whose coefficients are positive integers, such as 17x^4+4x^3+0x^
    9·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!