answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
2 years ago
6

As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro

m home complain about not being connected to the network except by e-mail. The company also has several employees who travel and would benefit from remote access connections. The director of marketing is responsible for part of the cost and wants only the best solution. Currently, you run a WindowsServer 2016 network, and users want access to all systems. Develop a plan to connect these remote users. Your solution can involve more than one remote access type.
Computers and Technology
1 answer:
Strike441 [17]2 years ago
8 0

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

You might be interested in
A major clothing retailer has requested help enhancing their online customer experience. How can Accenture apply Artificial Inte
Harrizon [31]

Answer:

Option D

Explanation:

Artificial intelligence is a technology where the information gathered in the past is processed for the future actions.

Here, based on the preferences of customer in the past and purchase history, AI can suggest the customer new products and services

Hence, option D is correct

3 0
2 years ago
On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
VladimirAG [237]

In this activity Morgan is preparing the digital files to a printer  on a DTP project.

Explanation:

DTP project is the creation of documents using page layout on a personal computer. The process of printing digital based images directly to variety of media substrates is known as digital processing.

The digital files like PDFs can be sent directly to digital printing press to print on paper, photo paper, fabric and so on.

They have unique fade rates and different sensitives to the various deterioration mechanisms. DTP is used for graphic designers to create documents.

6 0
2 years ago
Read 2 more answers
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the
Keith_Richards [23]

Answer:

the answer is d. Hybrid attack.

8 0
2 years ago
There is a company of name "Baga" and it produces differenty kinds of mobiles. Below is the list of model name of the moble and
Anna007 [38]

Answer:

Microsoft Word can dohjr iiejdnff jfujd and

8 0
2 years ago
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, an
Nadya [2.5K]
Digital Immune System (DIS)
6 0
2 years ago
Other questions:
  • Hybrid processors that can process 32 bits or 64 bits are known by what term?
    8·1 answer
  • Many organizations keep copyrighted information on their intranets, which is one reason usernames and passwords are required. Tr
    13·1 answer
  • What are common names for some primary discrete components used on circuit boards?
    13·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • When you park on a hill, think about which way _____.
    6·2 answers
  • while investigating the settings on your SOHO router, you find two IP address reported on the devices's routing table, which is
    5·1 answer
  • As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
    9·1 answer
  • The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
    8·1 answer
  • 3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s
    10·1 answer
  • You are a high school student learning about computers and how to build them. As a class project, you have built a new computer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!