1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
6

1) You are working with an organization as a network manager. The organization has

Computers and Technology
1 answer:
pantera1 [17]3 years ago
7 0

Answer:

Explanation:

a. In this specific scenario, the best option would most likely be a site-to-site VPN. This would allow each office to be independently connected to the internet and at the same time be connected to each other securely and efficiently. There should be unnoticeable or no delay at all between the two offices and sensitive files will be completely secure. Therefore, the two offices can easily transfer data securely between one another without fear of the data being intercepted.

b.  The same VPN network would work on the head office, but instead we can implement firewall restrictions to the head office network itself. These restrictions would prevent any or all incoming connections that are trying to request data from the local head office network. This would allow the head office to continue working without worry of unwanted intruders in their network.

You might be interested in
What is a relationship between a object and a class?
Mrrafil [7]

A. An object is an instance of a class. The class is like the recipe to create (multiple) objects.

8 0
3 years ago
Write a program to output 3 lines of text with the following information:
mojhsa [17]

Answer:

C LANG

#include <stdio.h>

// function main begins program execution

int main( void )

{

printf( "student's first name" );

} // end function main

PYTHON

student's name=''

born_date=''

class=''

print ('')

Explanation:

create an sql database rows and Columns then use sql commands to call any specific data if so :

(you have a complet database of students data)

SELECT born_date

FROM students

//(Call all students born_date )

//you can specify

********,*********

to create an sql table

CREATE TABLE students (

name char,

born_date int,

class int,

);

7 0
2 years ago
Select the correct answer. Larry finds it easy to run legacy programs and applications in a virtualized environment. How does th
muminat

The answer is B: installs and runs different versions of an operating system on the same computing device

Virtual machines are like guest operating systems or application environments that give you the perception that you are physically connected to a different box. A system virtual machine, for instance, copies all the components and processes of a real computer. It helps the user experiment with different operating systems and applications without the need to install them on your physical hardware.


8 0
3 years ago
Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
xeze [42]
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

7 0
3 years ago
To conserve its public IP addresses, a company can instead use ____ addresses for devices within its own network boundaries.
Thepotemich [5.8K]

Answer:

private ip addresses

Explanation:

A private ip address is assigned to each device on a network, allowing devices on the same network to communicate with each other without using any public ip addresses.

7 0
2 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • Tara referred to various information sources while writing her research paper. How can she acknowledge these sources in her docu
    8·1 answer
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • This is not based on homework but I have a question. I am currently using a gtx 960 with a 6 core amd processor. Does anyone kno
    6·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • What is wrong with question four? Find the error and then correct it
    11·1 answer
  • How many strings with five or more characters can be formed from the letters in seeress?
    15·1 answer
  • HELP PLEASE
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!