answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
1 year ago
13

You are designing a distributed application for Azure. The application must securely integrate with on-premises servers. You nee

d to recommend a method of enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application. What should you recommend?
Computers and Technology
2 answers:
Shkiper50 [21]1 year ago
6 0

Answer:

Azure Site-to-Site VPN

Explanation:

First of all what is a distributed application

According to Techopedia  

 A distributed application is software that is executed or run on multiple computers within a network. These applications interact in order to achieve a specific goal or task.  

Azure distributed applications are software that run on Azure which is a cloud base technology that not only provides an Application Hosting environment, but also a full-scale Development Platform.  

In order to understand why this answer for this question we need to also understand what an On-premises server is.

On-premises:  

This can be defined as a computer application that is always found at a company's data center instead of running it on a hosted server or in the cloud  

Now an Azure Site-to-Site VPN is the recommended method for enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application because IPsec can be used on Site-to-Site VPN, and Distributed applications can used the IPSec VPN connections to communicate.

Nataly_w [17]1 year ago
4 0

Answer:

Azure Site-to-Site VPN

Explanation:

Distributed applications are computer softwares that run and work with each other on different computers that are registered under a network to execute a specific task.

And the method of enabling Internet Protocol security (IPsec)-protected connections between on-premises servers and the distributed application is a Site-to-Site VPN.

Azure Site-to-Site VPN gateway connection is used to securely integrate with on-premises servers. It is used to send encoded messages.

You might be interested in
python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
e-lub [12.9K]

Answer:

// program in Python.

#read year

i_year=int(input("Please Enter a year:"))

#check leap year

if((i_year % 4 == 0 and i_year % 100 != 0) or (i_year % 400 == 0)):

   print("{} is a leap year.".format(i_year))

else:

   print("{} is not a leap year.".format(i_year))

Explanation:

Read year from user and assign it to variable "year".If year is completely divisible by 4 and not divisible by 100 or year is completely divisible by 400 then year is leap year otherwise year is not a leap year.

Output:

Please Enter a year:2003                                                                                                          

2003 is not a leap year.

3 0
2 years ago
Read 2 more answers
Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
iragen [17]
“Ana girl you need to stop going on the internet like that you know we can’t do that stuff on the work computers, and what if they check the history or the IT has that thing we’re you can see stuff on your computer on his computer?” ... “ Girl you finna get in some trouble and it’s gonna be your fault because you wanted Victoria Secret perfume” ... “Girl cut it out I’m telling you, and plus how do you know if I’m not IT I could like get you in trouble girl so yeah stop”
8 0
2 years ago
How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
Lana71 [14]
How efficient well if we are transmitting 6bits and we need 10 to transmit the 6 bits that would be 6/10 = .6 = 60% efficient.
7 0
1 year ago
add is a method that accepts two int arguments and returns their sum. Two int variables, euroSales and asiaSales, have already b
Oduvanchick [21]

Answer:

// here is code in Java.

// package

import java.util.*;

// class definition

class Main

{

   // method that return sum of two sale value

   public static int Add(int euroSales,int asiaSales)

   {

       // return the sum

       return euroSales+asiaSales;

   }

   //main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // variables

       int euroSales=100;

       int asiaSales=150;

       int eurasiaSales;

        // call the function

       eurasiaSales=Add(euroSales,asiaSales);

        // print the sum

       System.out.println("total sale is:"+eurasiaSales);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Declare and initialize two variables "euroSales=100" and "asiaSales=150". Declare another variable eurasiaSales. Call the method Add() with euroSales and asiaSales as parameter. This method will add both the value and return the sum.This sum will be assigned to variable eurasiaSales.Then print the sum.

Output:

total sale is:250  

8 0
2 years ago
Replace the underlines with the words in parentheses that follow: the ____ solves the ____ of a ____ by expressing an ____ in a
adell [148]

The programmer solves the problems of a user by expressing an algorithm in a programming language to make a program that can run on a computer.

5 0
2 years ago
Other questions:
  • Write a program that allows you to create a file of customers for a company. The first part of the program should create an empt
    12·1 answer
  • Which of the registration patterns is best suited for complex architecture? A. Client side discovery pattern B. Third party regi
    13·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable studentID that has bee
    10·1 answer
  • If the result is for a BART Transit Station: "Daly City Station" with the result address "Daly City,CA". What is the correct rat
    8·1 answer
  • What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages se
    15·1 answer
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
    13·2 answers
  • (Java) Which of the following code segments correctly declare a Strings and gives it a value of "fortran".
    12·1 answer
  • If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize? Master v
    9·1 answer
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!