1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
13

Josh is designing a new network infrastructure that will allow unauthenticated users to connect from the Internet and access cer

tain areas. The goal is to protect everything internal while still providing outside access. Josh decided to put the web server on a separate subnet that’s open to public contact. What is this subnet called?
Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
4 0

Answer:

DMZ

Explanation:

DMZ also called delimitarized some r or perimeter network is a form of computer security that with a physical and logical subnetwork of an organization external site accessible by external untrusted users. It is meant to enhance security. It allows the access to the companies private local network copied to the delimitarized zone on the internet and make time to detect and expose breach of network.

You might be interested in
When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
Zinaida [17]

Answer:

TRUE

Explanation:

the given statement is correct hence TRUE

troubleshooting is problem solving often applied to repair failed product .

Firewall is used for network security for the computer is monitors and controls the incoming and outgoing network traffic.

Basically what Firewall do is it create barrier between trusted networks and not trusted network.

8 0
3 years ago
Modify the solution to PP 11.1 such that it catches and handles the exception if it is thrown. Handle the exception by printing
Svetradugi [14.3K]

Answer:

Explanation:

The following code is written in Java. After finding the PP 11.1 file online I added the try/catch to the code as requested by the question. The program takes the input from the user, checks it's length, and if it contains more than 20 characters it throws the exception. This exception states that "the string has more than 20 characters" and then continues processing more strings until the user enters "DONE". The program has been tested and the output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

3 0
3 years ago
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit
Contact [7]

Answer:

A Trojan

Explanation:

Emma has downloaded a Trojan. A Trojan, also referred to as Trojan horse is a type of malware that may look like it is legitimate, but once installed in your computer, it can cause a great havoc by taking control of your computer. It is usually designed to cause damage to a system, or to steal information, or inflict harm to your network or computer.

8 0
4 years ago
Can someone be my friend,don't friend me until i ask you Questions
Semmy [17]

Answer:

Explanation:

actually you suck. nevermind.

3 0
3 years ago
Which osi reference model layer is responsible for transmitting information on computers connected to the same local area networ
Nikolay [14]
The data link layer (layer 2)
7 0
4 years ago
Other questions:
  • You want to discard your old computer but want to securely erase the data from your hard drive, what can Use to do this?
    5·1 answer
  • Which database item would show details such as a customer’s name, their last purchase, and other details about a customer?
    11·2 answers
  • What is the difference between a technological problem and a technological opportunity? Explain with an example.
    7·2 answers
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    9·1 answer
  • The amount of RAM storage is measured in A: GB The rule of thumb that predicts that CPU capacity will double every 2 years is ca
    11·1 answer
  • Which tool determines whether or not applications, devices, and computers will work with a new operating system, while maintaini
    13·1 answer
  • How do even do anything on Rblx Creator?? Will give branliest for whoever gives me the most info.
    13·1 answer
  • I know nothing abt computers
    14·1 answer
  • Help me. thank you very much
    14·1 answer
  • In python,
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!