1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
4 years ago
13

NEED HELP ASAP!

Computers and Technology
1 answer:
Marrrta [24]4 years ago
8 0
Six inches is the answer
You might be interested in
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
The closing of the letter should have at least
asambeis [7]

Answer:

Im unclear exactly what it is saying but i think its 2

7 0
3 years ago
Which of the following statements is not correct ​
just olya [345]
Wich statements ? I don’t see anything
4 0
3 years ago
Read 2 more answers
Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
inn [45]

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

5 0
3 years ago
What do the points on this website do?
DanielleElmas [232]

Answer:

They allow you to ask more questions and also your rank goes up or down.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • ______ is a disadvantage of EDI.
    8·1 answer
  • p3_unzip :: [(a,b)] -&gt; ([a], [b]) Write a function that takes a list of two-tuples and returns a tuple of two lists -- the fi
    9·1 answer
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • Devices which are used to receive data from central processing unit are classified as
    11·1 answer
  • Please help
    11·1 answer
  • If you delete a shortcut from your desktop, have you also deleted the original file?
    11·2 answers
  • 1. Do our shared social experiences lead us to think<br><br> communication is a cure-all?
    13·1 answer
  • Why do we need the system requirements for Adobe photoshop?
    14·1 answer
  • When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the ____
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!