1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
2 years ago
8

A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections

to secure the server from getting compromised by a hacker
Computers and Technology
1 answer:
kenny6666 [7]2 years ago
7 0

Use of Secure Firewall, Bastion Hosts and Access Control Lists are the way to prevent getting compromised by a hacker.

<h3>Who is a hacker?</h3>

A hacker are unauthorized users who are seeking to break into a secured or unsecured computer systems.

The way you can restrict the connections and securing the server from getting compromised by a hacker includes:

  • Use of Secure Firewall since its restrict connections between untrusted networks and systems.
  • Use of Bastion Hosts because they are specially hardened and minimized in terms of what is permitted to run on them.
  • Use of Access Control Lists.

Read more about hacker

<em>brainly.com/question/24327414</em>

You might be interested in
Which of the following is not an advantage of e-commerce for consumers?
matrenka [14]

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

3 0
2 years ago
Read 2 more answers
I will give Brainliest and Extra points for correct answers!!!
AlexFokin [52]
Autauga Alabama 55,869
Baldwin Alabama 223,234
Barbour Alabama 24,686
3 0
2 years ago
Read 2 more answers
Among your selection in different online interfaces, which are your top three favorites?​
topjm [15]
What is this ? History or ?
6 0
3 years ago
Read 2 more answers
The ____ criteria filter requires the records displayed to start with the specified text string
lys-0071 [83]

The "Begins With" criteria filter is what your looking for

3 0
3 years ago
Do you play Rocket League
lakkis [162]
Yessirrr like 3 times a week
6 0
2 years ago
Read 2 more answers
Other questions:
  • Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWin
    15·1 answer
  • _____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
    10·1 answer
  • Which of the following would be considered a strong password?
    5·2 answers
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • How can i turn on my prinfer without getting up
    12·2 answers
  • If you want to present slides to fellow students your coworkers which productivity software should you use to create them
    15·2 answers
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • Leon wants an output from his tablet. What should he look at?
    9·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!