Routing and remote access services allow users to connect to private networks using or:.

Answers

Answer 1

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.


Related Questions

webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. true or false?

Answers

The statement that webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so is false.

What is webrooming?

It should be noted that webrooming simply means the consumer practice for researching products online before buying theme in stores.

In this case, the main idea of webrooming isn't to buy it at stores because it's cheaper. Therefore, it's false.

Learn more about webrooming on:

brainly.com/question/14988432

#SPJ12

A for statement contains three expressions: initialization, test, and:

Answers

A for statement contains three expressions and these are:

InitializationTestUpdate

What is a for statement?

A for statement can be defined as a type of statement that is written by a computer programmer to repeat an action or event in a software program for a specific number of time.

In Computer programming, a for statement contains three expressions and these include the following:

InitializationTestUpdate

Read more on statements here: https://brainly.com/question/18736215

#SPJ12

Your friend just noticed his smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about computers and smartphones, so he doesn't know what type of charging cable he needs. He knows his phone is running iOS 12. What kind of cable does your friend need to charge his phone

Answers

Answer:

Lightning

Explanation:

Apple Inc. designed and developed the Lightning computer bus and power connection. Apple mobile devices such as iPhones, iPads, and iPods use the Lightning connection to connect to host computers, external displays, cameras, USB battery chargers, and other accessories. Lightning is substantially smaller than its predecessor, with only 8 pins instead of 30.

what is the minimum number of load balancers needed to configure active/active load balancing?

Answers

Answer:

2

Explanation:

The primary and secondary machines should both be actively handling connections to your virtual servers in order for active/active to entail having two load balancing appliances running concurrently. The second interpretation of active/active has to do with ones back end servers, which are all running and accepting connections behind the virtual service. This makes use of all of your available computing power for accepting connections.

The minimum number of load balancers needed to configure active/active load balancing is 2.

What are load balancers?

Load balancing is known to be a key networking solution that is often employed to share traffic across multiple servers in the case of server farm.

Note that The minimum number of load balancers needed to configure active/active load balancing is 2.

See full question below

What is the minimum number of load balancers needed to configure active/active load balancing?

- 2

- 4

- 1

- 3

Learn more about load balancers from

https://brainly.com/question/13088926

#SPJ11

A router is performing basic routing functions. What will be the third step in the transmission of a packet?

Answers

The third step in the transmission of a packet is known as a network layer.

What is a router?

It should be noted that a router is a device that connects two or more packets networks.

Here, the third step in the transmission of a packet is known as a network layer. It adds another header in what is received.

Learn more about router on:

brainly.com/question/24812743

#SPJ12

The programming process consists of several steps, which include:

Answers

The programming process consists of several steps, which include: Design, creation, testing, and debugging.

What are the steps in programming process?

The programming process is also made up of:

Defining the problem.Planning the solution.Coding the program.Testing the program.Documenting the program

Note also that The programming process consists of several steps, that include: Design, creation, testing, and debugging.

Learn more about programming process from

https://brainly.com/question/22654163

#SPJ12

what nat ip address is a public ip address that maps to an inside device?

Answers

The nat ip address is a public ip address that maps to an inside device is "inside global".

What is IP address?

It should be noted that IP address simply means an internet protocol address that's is associated with a computer network.

In this case, the nat ip address is a public ip address that maps to an inside device is "inside global".

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

_____ view provides the most options for defining fields.

Answers

A table design view provides the most options for defining fields.

What is table design?

Tables are known to be a design pattern for showing a big amounts of data in rows and columns.

Note that in the case above, A table design view provides the most options for defining fields.

Learn more about  table design from

https://brainly.com/question/26961510

#SPJ12

Jack is an accountant he can't access the spreadsheet software which is installed on the server what should jack do

Answers

Answer:

Ping

Explanation:

Jack should ping the server and check to see if it has crashed. The ping command is a networking utility that determines if an IP address or domain is accessible. Once it is determined, Jack may utilize the data to derive additional inferences. While troubleshooting internet access, pinging is generally the first line of protection. It not only tests connection, but it also counts time and ensures that all Internet Control Message Protocol packets are accountable.

When a cookie is created during a website visit, it is stored:

Answers

When a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

What is a cookie?

A cookie simply means the small blocks of data that are created by a web server.

In this case, when a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

Learn more about cookie on:

brainly.com/question/1308950

#SPJ12

What do both wireless lans (wlans) and wireless wans (wwans) rely on as the communication medium?

Answers

Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium.

What is Radio spectrum?

The radio spectrum is known to be an aspect of the electromagnetic spectrum that is said to have frequencies from 0 Hz to 3,000 GHz.

Note that Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium for their functions.

Learn more about WLANS from

https://brainly.com/question/26956118

#SPJ12

Which blu-ray standard defines rewritable disks?

Answers

The blu-ray standard that defines rewritable disks is BD-RE.

What is a rewritable disk?

It should be noted that a rewritable disk simply means an erasable disk that can be reused.

In this case, the blu-ray standard that defines rewritable disks is BD-RE. It is the recordable standard.

Learn more about disks on:

brainly.com/question/20381259

#SPJ12

Which wan connection types use digital communications over pots?

Answers

The WAN Connection that uses digital communications over pots is called; Digital Subscriber Line (DSL)

How to understand WAN (Wide area network)?

A wide area network(WAN) is defined as a telecommunications network that extends over a large geographic area.

Now, there are different means of transmitting these WAN networks but the connection type that uses digital communication over pots is called Digital Subscriber Line (DSL). This is because it digitally transmits data that is sent over the POTS copper wire infrastructure using Point–to–point (PTP) technology which experiences little to no congestion.

Read more about Wide area Network at; https://brainly.com/question/8118353

#SPJ12

Suppose a family has had a house fire in which they lost many photos, and they are worried about losing more if they have another. Which of the following is a reason this family may want to digitize their photos? Choose all that apply.

A: to make it easier to e-mail photos to friends

B: to maximize file space on their hard drive

C: to minimize risk of losing photos by backing them up in virtual space

D: to save space in their home

Answers

Answer:

C - Minimize the risk of future loss.

Explanation:

All four reasons listed are valid reasons to digitize family photos, but in this instance where this family has lost photos in a house fire before, minimizing the risk of losing photos in the future might be their primary goal.

In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources assigned to other operating systems running in the same hardware environment

Answers

Answer:

VM escape attack

Explanation:

In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.

What should be used to prevent javascript from accessing a session id value?.

Answers

Cookies should be used to prevent javascript from accessing session-id values.

What are cookies?

Cookies are brief text messages that a website you visit sends to your browser.

Web browsers are instructed to only send cookies using encryption using the Secure cookie property.

The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.

Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,

JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.

Hence, cookies should be used to prevent javascript from accessing session-id values.

To learn more about the cookies refer to:

https://brainly.com/question/20263903

#SPJ1

When a file is used by a program, there are three steps that must be taken:

Answers

The three steps that must be taken:

Open the file Process the fileClose the file

What is file opening?

The act of Opening a file is one that makes a a connection to exist between the file and the program.

Note that The three steps that must be taken:

Open the file Process the fileClose the file

Learn more about program from

https://brainly.com/question/1538272

#SPJ12

A destination port number at the transport layer identifies which application on a computer should receive the data transmission

Answers

A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.

What is the transport layer?

The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.

In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.

Read more on transport layer here: https://brainly.com/question/26177113

#SPJ12

algorithm to print the first 10 odd numbers​

Answers

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

QUESTION 9 OF 100
What does it means when you see a sign with an "X" and two
letters "R" sign posted on the roadside?

Answers

Answer:

it means go sleep on ur bed

jk

Answer:

the sign means "railroad"

Explanation:

Which is considered the most widely used cloud computing service?

Answers

The most widely used cloud computing service is the Amazon web services.

What is cloud computing?

It should be noted that cloud computing simply means the on-demand availability of computer resources without direct active management by the user.

In this case, the most widely used cloud computing service is the Amazon web services.

Learn more about cloud computing on:

brainly.com/question/19057393

#SPJ12

i) Convert 8GB to bits. Give the expression.

Answers

Answer:

64 billion

Explanation:

1gb = 1 billion bytes

so 8gb = 8 billion bytes

then

1 byte= 8 bits

so 8 billion bytes = 8 × 8 billion bits, 64 billion bits

7.7% complete Question An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable

Answers

The solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

What is data?

It should be noted that data simply means the representation of facts ans concepts on a formalized manner.

In this case, the solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

Learn more about data on:

brainly.com/question/4219149

#SPJ12

what do you mean by computer ethics?​

Answers

Answer:

Computer ethics is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.

Take dismal Jack la floor italianizarla pues

what statement can you use to divide a script into multiple batches?

Answers

The GO statement can be used to divide a script into multiple batches

How to determine the statement?

To divide a script, we make use of the GO statement or the GO command.

The GO statement has no syntax because it is not a keyword in SQL.

However, it is used by the SQL to create a group or batch of instructions that would be sent into the server

Read more about SQL at:

https://brainly.com/question/25694408

#SPJ11

HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not

When you coordinate tasks by email, you show respect for the recipient's time by:

Answers

When tasks are coordinated by email, you can show respect for the recipient's time by clearly stating your availability.

What is an e-mail?

An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.

As good work ethics, when tasks are coordinated by e-mail, you can show respect for the recipient's time by clearly stating your availability and providing details about time frames.

Read more on e-mail here: https://brainly.com/question/15291965

#SPJ12

You hide three worksheets in a workbook and need to unhide them. What is an accurate statement about this process?

Answers

The  accurate statement about this process is that "The person must unhide each worksheet separately".

How do you unhide multiple sheets in Excel?

To unhide multiple sheets, one can:

Right-click the Sheet tab at the bottom, and then click on  Unhide. Then also click all together the Shift + Up/Down Arrow keys to click multiple (or all) worksheets, and then click OK.

Note that The  accurate statement about this process is that "The person must unhide each worksheet separately".

Learn more about worksheets  from

https://brainly.com/question/25130975

#SPJ12

the control plan is essential because it tells the

Answers

The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

What is the aim of a control plan?

A control plan is known to be a kind of living document that states the methods to be used for quality control of any vital or critical inputs to transport outputs that can meet customer requirements.

Note that The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

Learn more about control plan from

https://brainly.com/question/25453419

#SPJ11

What is open source software​

Answers

Answer:

Open Source Software

Explanation:

Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Answer:

open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner

Explanation:

helpful

Other Questions
How many hydrogen atoms are present in 2-methyl-2-butene? The scores of a high school entrance exam are approximately normally distributed with a given mean mu = 82.4 and standard deviation sigma = 3.3. what percentage of the scores are between 75.8 and 89? 68% 95% 99.7% 100% For the function G(x)=5x+1, evaluate G(6).Provide your answer below:G(-6) = probability of hitting the shaded area EMERGENCY!! 25 POINTS!! Find 40th term of 5n - 3 Which of the following statements was true of the Ottomans and Safavids?Select one:O a. They both extended their territory into Eastern EuropeO b. They both developed on the Anatolian PeninsulaO c. They both persecuted Christian and Jewish minoritiesO d. They both utilized gunpowder weaponry simplify: (-291) 134 What is the range of the relation in the table below? In the expansion of (3a + 4b)^8, which of the following are possible variable terms? a2b3; a7b; ab8; b8; a4b4; a6b2; a3b4; a8i dont get this can someone please explain # How would you teach English Subject at your Bridge course class,if you were an English Teacher? A car manufacturer needs to assemble the maximum number of cars using the following equation: 1 body frame + 4 wheels + 2 headlights + 2 brakes + 1 engine It has 48 body frames, 64 headlights, 80 wheels, 60 brakes and 30 engines. What is the limiting reactant in this case? What is the effect on a field of tall grass when a wave caused by a cool summer breeze passes through the field?Select one:a. The grass leans in the direction the wind is blowing, then returns to its original position.b. The field of grass exhibits a permanent disturbance in the direction the wind is blowing.c. To counteract the effect of the breeze, the grass leans into the wind.d. Some grass leans in the direction the wind is blowing and some leans into the wind. please answer this! (from khan academy 6th grade math) 15 In the figure, O is the centre of the circle. The diameter of the circle, AB, is 14 cm, andis the same as the length of each side of the square PQRS. Find When you tell your audience about your personal experience with the topic, you are a. gaining the attention of the audience b. setting the mood and tone of your speech c. previewing the main points d. establishing your credibility Semantic code describes the ___ of content on a page, regardless of the style or appearance of that con what is the intercepts for y=2x-7 Explain the effects that alcoholism has on school perform When dividing its total debt by total equity whats a company trying to measure solve the following inequality ( algebra 1 )