1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
2 years ago
8

A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections

to secure the server from getting compromised by a hacker
Computers and Technology
1 answer:
kenny6666 [7]2 years ago
7 0

Use of Secure Firewall, Bastion Hosts and Access Control Lists are the way to prevent getting compromised by a hacker.

<h3>Who is a hacker?</h3>

A hacker are unauthorized users who are seeking to break into a secured or unsecured computer systems.

The way you can restrict the connections and securing the server from getting compromised by a hacker includes:

  • Use of Secure Firewall since its restrict connections between untrusted networks and systems.
  • Use of Bastion Hosts because they are specially hardened and minimized in terms of what is permitted to run on them.
  • Use of Access Control Lists.

Read more about hacker

<em>brainly.com/question/24327414</em>

You might be interested in
Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
blagie [28]

Answer:

  • Print(x) would be directly calling the x variable so it would print everything but the []
  • Print(x[10]) is calling the number 10 which results in E
  • 2 + d= 2d

3 0
3 years ago
1
Dimas [21]

Answer:

C.  

Explanation:

Plato users

8 0
3 years ago
Law Enforcement Online (LEO) is a secure intranet system created and maintained as a tool for communicating, obtaining mission-c
zalisa [80]

Answer:

Federal Bureau of Investigation

Explanation:

LEO seems to be a protected intranet network developed as well as operated as a resource for networking, accessing task-critical information, delivering or engaging through online training services, as well as engaging in technical or contextual conversations for concern. The Federal Bureau of Investigation seems to be accountable for managing LEO.

  • Option A is not correct according to the statement because It is primarily responsible for organizing as well as conducting US narcotics operations including domestically as well as internationally.
  • Option C is not correct according to the statement because it is responsible for terrorist attacks and other disasters.
3 0
3 years ago
Software on the nas handles features such as data storage, file access, and file and storage management. true or false
Alexus [3.1K]
True! pretty sure :D
7 0
3 years ago
Read 2 more answers
Which stage of the waterfall model is most like the simple model's Stage 5: Write the Code? (Select the best answer.)
4vir4ik [10]

Answer:

HERE ARE THE ACTUALL ANSWERES, and I INCLUDED ALL 15 QUESTIONS WITH ANSWERS(The other dudes are VERY VERY wrong):

1. Implementation

2. System processing requirements

3. Quality Assurance

4. Interactive and incremental development

5. Changes made to a software program's code and who made changes to it<em>(this one he actually had right)</em>

6. The SOW

7. Something that limits your project

8. Proprietary software

9. Dependancy

<em>(The rest of these are the remaining answers to the quiz to the last 5 questions. I got yall!)</em>

10. Stage 2: Think of possible solutions

11. Informal

12. Procedural programming

13. Use Cases

14. Alpha realease

15. Writing program that writes or changes other programs.

Well.  I hope you pass this annoying quiz with a 100%.  I bit the bullet and got 40, but they did give me the actuall answers to every question.  Honestly this course sucks and I can't wait to never programm ever again.  Good luck all!

- Some dude lol

7 0
3 years ago
Other questions:
  • is this website just for a bunch of lazy kids bumming off answers? Because if that were the case I'd be one of them.
    9·1 answer
  • What feature does google docs have to allow users to work in a document?​
    8·1 answer
  • What width would you choose for the pdf?
    12·1 answer
  • 7) The small slots on the front, back, or side of your computer that allow you to connect devices (such as a keyboard, mouse, or
    11·1 answer
  • What is a device driver
    10·1 answer
  • When would it be beneficial to make a copy of a document
    10·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • Helloooooo people, thats all I just wanted to say :D​
    11·1 answer
  • If you have limited means, you...?
    9·1 answer
  • What is an index? What are the advantages and disadvantages of using indexes? How do you use SQL to create an index?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!