answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
2 years ago
13

You are designing a distributed application for Azure. The application must securely integrate with on-premises servers. You nee

d to recommend a method of enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application. What should you recommend?
Computers and Technology
2 answers:
Shkiper50 [21]2 years ago
6 0

Answer:

Azure Site-to-Site VPN

Explanation:

First of all what is a distributed application

According to Techopedia  

 A distributed application is software that is executed or run on multiple computers within a network. These applications interact in order to achieve a specific goal or task.  

Azure distributed applications are software that run on Azure which is a cloud base technology that not only provides an Application Hosting environment, but also a full-scale Development Platform.  

In order to understand why this answer for this question we need to also understand what an On-premises server is.

On-premises:  

This can be defined as a computer application that is always found at a company's data center instead of running it on a hosted server or in the cloud  

Now an Azure Site-to-Site VPN is the recommended method for enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application because IPsec can be used on Site-to-Site VPN, and Distributed applications can used the IPSec VPN connections to communicate.

Nataly_w [17]2 years ago
4 0

Answer:

Azure Site-to-Site VPN

Explanation:

Distributed applications are computer softwares that run and work with each other on different computers that are registered under a network to execute a specific task.

And the method of enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application is a Site-to-Site VPN.

Azure Site-to-Site VPN gateway connection is used to securely integrate with on-premises servers. It is used to send encoded messages.

You might be interested in
) A byte is used to represent a single character in the computer ______<br> true or false?
sdas [7]
Answer: false
Explanation:
7 0
2 years ago
Read 2 more answers
What does Josh Silverman name as the most important aspect of managing finances?
Andre45 [30]

The answer is a the first one

6 0
1 year ago
Read 2 more answers
Why should the data in a reservation system that is constantly being updated be stored on a magnetic disk instead of a CD or DVD
9966 [12]

Answer:

Magnetic disks are easier to write and rewrite data on.

Explanation:

6 0
2 years ago
When you propose a solution to your argument during the conflict resolution process, you should make sure you are using ______.
max2010maxim [7]

None of the options is true. Correct answer: D In contrast, when you propose a solution to your argument during the conflict resolution process, you should make sure you are not using arguments from emotion, ad hominem arguments or neutral arguments. You should use strict, objective arguments and be not lead by emotions.

7 0
2 years ago
Read 2 more answers
Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
blondinia [14]

Answer:

1) Nate open his template first and clicks the tab on the ribbon

2) Then, he clicks the dialog box that appears

3) He chooses Templates from the menu

4) Clicks Go to clicks the Organizer button

5) Then he clicks copy

6) Next he clicks on the left side to the backstage view

7) Finally, he selects the document that includes the style he wants to transfer to the normal template

Explanation:

I hope this helps

5 0
1 year ago
Other questions:
  • Rebooting a system in an attempt to fix a problem is an example of the ____ problem-solving strategy.
    11·1 answer
  • Which of the following attributes of a website indicates a more reliable source for information?
    15·1 answer
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • Produce a list named prime_truths which contains True for prime numbers and False for nonprime numbers in the range [2,100]. We
    11·1 answer
  • Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing
    11·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • JAVA Write a program that first asks the user to type a letter grade and then translates the letter grade into a number grade. L
    9·1 answer
  • What missing condition will give you the output shown?
    8·2 answers
  • A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit wi
    15·1 answer
  • First, open two separate terminal connections to the same machine, so that you can easily run something in one window and the ot
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!