1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
3 years ago
6

your manager ask you to set up a secure network connection at a remote site which protocol would you use

Computers and Technology
1 answer:
leonid [27]3 years ago
3 0

Answer:

Remote Access Protocols

Explanation:

Considering the situation above, the most appropriate protocol to use is known as the Remote Access Protocol.

This is because Remote Access Protocol is a combination of techniques and sets of instructions that are used in managing the connection between a remote access server and a remote computer. For example, some of the Remote Access Protocols that can be used are Serial Line Internet Protocol, Point-to-Point Protocol, Point-to-Point Protocol over Ethernet, etc.

Hence, given that a trusted Remote Access Protocol allows people to access a steady, secure connection between desktop sharing and remote access for help desk activities.

Therefore, the Remote Access Protocol can be utilized in setting up a secure network connection at a remote site

You might be interested in
An op amp requires the design equation vout = 50vin 3vref agvg. what is the value of ag?
stich3 [128]
The possible solution for this kind of problem is to equate the said equation base on what is ask in the problem.  The design equation is use to get the Voltage out of a said circuit, thus, without any value of resistance, the left and side value of the equation should be the same, and the said problem is generally incomplete. With that, the possible answer would be -53.
4 0
4 years ago
Solve the equation.<br>| 11 X 12362​
sergey [27]

Answer:

135982

Explanation:

Its simple math

4 0
3 years ago
How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
Neporo4naja [7]

<span>To capitalize lowercase “a” which is 0110001 which is “A” you will need to flip the following bites 01000001<span> as represented in ASCII. Since we are only looking at 2bit digit which is 0 and 1 which  has a 256 possible combinations from 0 up to 255. </span></span>


6 0
3 years ago
A restaurant recorded the ages of customers on two separate days. You are going to write a program to find the minimum age of a
Liono4ka [1.6K]

According to your code, you are setting the first element of the customerAges list as your baseline age. You then use a for loop to check each item in the list to see if it is less than your minimum variable. Then you assign the item to the minimum.

The missing line of code is b, if minimum > item:

I hope this helps!

7 0
4 years ago
Read 2 more answers
Which social networking function came first?
amm1812

D, Online bulletin boards.


♣Amaranthine
3 0
3 years ago
Read 2 more answers
Other questions:
  • When entering a function or formula in a cell, which is the first character you must type?
    15·2 answers
  • Why do most people share, especially photos online using social media?
    11·2 answers
  • P**nhub or x-videos or other
    9·1 answer
  • In which folder would it be most appropriate to save your latest history report about World War I? History New Folder Science St
    15·1 answer
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Hat are the technical risks and the human risks for the ticktacktoe game
    15·1 answer
  • Which of these is a sign of healthy A)very high inflation B)A rise in consumers spending C)a shift supply of essential goods D)H
    7·2 answers
  • Write the following program: Use struct data type to store information about courses. Every course is characterized by the follo
    6·1 answer
  • Film’s importance in today’s economy?
    12·1 answer
  • Given the tables PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, Phone Number) as shown in the figure
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!