1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
4 years ago
9

Several new projects are being staffed by outside contractors who will be working on servers in the contractors' office, not in

the company building, and will have their own VPN server. The contracting company has informed your company that none of its people will be working weekends. What VPN controls can you set up to minimize contract employees' access to your network?
Computers and Technology
1 answer:
OverLord2011 [107]4 years ago
6 0

Answer:

<em>The VPN control that can be used to minimize employee's access to your network is, by enabling NAP VPN server which monitors client  computer trying to access your network, this is made possible by the NAP enforced client.</em>

Explanation:

<em>The VPN controls that can set up to minimize contract employees' access to your network is taken as follows:</em>

<em>The first step top take is to configure the Network Access Protection (NAP) allows an infrastructure to often check the client's computer if they are trying to get access to a network.</em>

<em>It is important such steps are taken for the overall protection of external threats and health of a network</em>

<em>Also we can state  some procedures and rules for a remote access by enabling the NAP VPN servers, that is to say, a client can be monitored for any kind or fishy activities, this is carried out by the NAP  client enforcement which will request access to a network.</em>

You might be interested in
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
Which magazine can help public determine best technology to buy
Dennis_Churaev [7]
Consumer report would help determine the best technology to buy.
4 0
3 years ago
You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
Elena L [17]

Answer:

step 1: sign up for an intune account

step 2: create intune user accounts

step 3: define intune policies

step 4: enroll mobile devices

step 5: link mobile devices to users.

Explanation:

The Microsoft Windows intune is a Microsoft cloud-based service that provides a central cloud service for all subscribed and linked devices. It provides a sense of security of data resource and tracking of device activities.

A company subscribes to intune to allow the use of both cooperate and BYOD (bring your own device to work), to access data. First, the administrator sign up and create the intune account, then defined the intune security policies. Then it enrolls the individual devices and links them to their respective users.

3 0
3 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
Which invention replaced vacuum tubes in computers?
dlinn [17]

Answer:

Transistors

Explanation:

6 0
3 years ago
Other questions:
  • Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons
    7·2 answers
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail
    12·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
    8·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • Complete the statement using the correct term.
    10·1 answer
  • A _______ is one typed character.<br> -gigabyte<br> -byte<br> -megabyte<br> -kilobyte<br> -terabyte
    7·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • Send link for a qc or paddle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!