1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
4 years ago
9

Several new projects are being staffed by outside contractors who will be working on servers in the contractors' office, not in

the company building, and will have their own VPN server. The contracting company has informed your company that none of its people will be working weekends. What VPN controls can you set up to minimize contract employees' access to your network?
Computers and Technology
1 answer:
OverLord2011 [107]4 years ago
6 0

Answer:

<em>The VPN control that can be used to minimize employee's access to your network is, by enabling NAP VPN server which monitors client  computer trying to access your network, this is made possible by the NAP enforced client.</em>

Explanation:

<em>The VPN controls that can set up to minimize contract employees' access to your network is taken as follows:</em>

<em>The first step top take is to configure the Network Access Protection (NAP) allows an infrastructure to often check the client's computer if they are trying to get access to a network.</em>

<em>It is important such steps are taken for the overall protection of external threats and health of a network</em>

<em>Also we can state  some procedures and rules for a remote access by enabling the NAP VPN servers, that is to say, a client can be monitored for any kind or fishy activities, this is carried out by the NAP  client enforcement which will request access to a network.</em>

You might be interested in
OMG 2 TIMES ;DDDDDDDDDDDDDDDDD​
torisob [31]

Answer:

Keep going! Nice!

Explanation:

INSANE :D

4 0
3 years ago
Which of the following is true about main and secondary memory?
Deffense [45]

Answer:

Main memory is short term memory used by the CPU in processing commands, secondary memory is more permanent and used for storage.

Explanation:

Hey there so just a quick explanation here.

Main memory is not used for storage and secondary memory is not lost when the device's power is turned off.

That leaves you to two possibilities:

  • Main memory is more permanent and used for storage, secondary memory is short term memory is used by the CPU in processing commands.
  • Main memory is short term memory used by the CPU in processing commands, secondary memory is more permanent and used for storage.

The bolded bullet point is the correct answer because, main memory is what's know as RAM on your computer. It could either be 4GB, 8GB or maybe even 16GB of RAM. But this is known as Random Access Memory, this is data stored no on the hard drive but on the processor, only momentarily and used when the CPU needs it.

Secondary memory is your Hard Drive, typically 256GB, 500GB, or 1TB which is 1000GB's. But this data is stored on the Hard Drive or Solid State Drive (SSD) and it stays there even when the computer is shot off.

Kind of like our phones, we take pictures on a Friday night dancing with our friends, but our phone dies. Saturday morning we wake up and haha! We get to see all the funny pictures we took that night, so even though it shuts off, our data is saved and secured.

Hope this helps and Good luck !!

Happy Coding :)

8 0
3 years ago
Give five examples of physical networking.
Vika [28.1K]

Answer:

Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN), Personal area network (PAN), Others

Explanation:

Others can be classified as peer to peer, bluetooth

6 0
3 years ago
What affect does the corona virus have the United States economy
Readme [11.4K]

Answer:

It can disturb the worldwide stock of products, making it harder for U.S. firms to take care of requests. It can likewise waylay laborers in influenced regions, diminishing work supply toward one side and on the other moderate the interest for U.S. items and administrations. The monetary interruptions brought about by the infection and the expanded vulnerability are being reflected in lower valuations and expanded instability in the money related markets. While the specific impact of the coronavirus on the U.S. economy is obscure and mysterious, obviously it presents colossal dangers. Corona will most legitimately shape monetary misfortunes through inventory chains, request, and budgetary markets, influencing business speculation, family unit utilization, and global exchange. The infection won't just influence supply, yet a few parts of the U.S. economy may likewise encounter decreases sought after—and enormous decreases in income—in light of the general consequences for the economy. More households are in debt and are not able to purchase the things they would normally purchase without a fixed budget

-Hope this helps

6 0
3 years ago
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be sto
AURORKA [14]

Answer:

Check the explanation

Explanation:

An entity can be a person, place, thing, or even an event about which data is collated and stored. Entities names usually are nouns.

The Entity Data Model (EDM) is an extensive model of the Entity-Relationship model which identifies the conceptual model of the data using a variety of modeling technique. It acan also be termed as a set of concepts that illustrates data structure, regardless of its stored form.

The Information stored or can be stored in a CASE repository regarding an entity includes:

Name

Definition

Special Notes

7 0
3 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • Arcade games such as Donkey Kong, Mr. Dol, and Venture were adapted from arcade titles to home consoles by which company?
    9·2 answers
  • The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
    15·1 answer
  • In this lab, you will write a function called numberGuessingGame(). When the function is called, it will do the following: gener
    13·1 answer
  • How to draw use case diagram
    13·1 answer
  • Which device contains or manages shared resources in a network?
    14·2 answers
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
  • Why might a programmer want to define his or her own functions? What are some potential disadvantages? How might new functions m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!