the administrator in an Exchange Server needs to send digitally signed and encrypted messages. What should the administrator use

Answers

Answer 1

In the above scenario of Exchange Server, the administrator should use S/MIME.

What is S mime tells?

S/MIME is a short form of the word Secure/Multipurpose internet Mail Extensions. This is known to be a famous and well used protocol that is often employed in transferring or sending digitally signed and encrypted messages.

Note that the S/MIME is often used in Exchange Online as it helps to give a lot of services for email messages such as Encryption.

Learn more about Server from

https://brainly.com/question/17062016


Related Questions

Besides the Game Engine, name and describe three other game development tools. Then, briefly compare and contrast these tools.

Answers

The three other game development tools are:

Level editing tools.Scripting tools.Modeling tools.

What are Game development tools?

A game development tool is known to bee any kind of specialized application that has been made to help assists or boast the creation of a game.

Conclusively, Note that those free game creating software written above can a person to start making  their dream game among others.

Learn more about development tools from

https://brainly.com/question/11352260

Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic security settings that should apply to all systems. What type of document should she create

Answers

The type of document should she create is  baseline document. Check more about the term Baseline below.

What is a Baseline document?

A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.

Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is  baseline document.

Learn more about Windows servers  from

https://brainly.com/question/14526761

#SJ1

Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages.

Answers

The subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

What is URL filtering?

The term URL filtering is known to function by looking at the similarities of all web traffic against a given URL filters.

Note that it is one that is made up of database of sites that users do access and as such, the subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

Learn more about subscription from

https://brainly.com/question/14073216

#SPJ1

100 points asap and brainly if right
Type the correct answer in the box. Spell all words correctly.
What term describes the site-to-site VPN used by Kevin’s company?
Kevin’s company has offices located in different states. All the offices are connected to the head office through a site-to-site VPN connection. Kevin’s company is using a(n) (blank) VPN.

Answers

Kevin’s company is using an “extranet” VPN

Answer:

extranet

Explanation:

VPN stands for virtual private networkVPN is used by companies for privacyIt also helps in keeping important data safe from hackers

Think about the activities that you do online. What are three ways you can use a web browser to make your experience easier and more enjoyable?

Answers

Answer:

Copy and paste

Keywords

Bookmark tabs

A programmer used Scratch to create a program with three frog sprites. If a
user clicks any of the frogs, they make a "boing" sound and glide to a random
position in the stage panel.
In this scenario, what are two examples of an algorithm?
A. The combination of panels that compose the Scratch interface
B. The code that instructs the computer to move the sprite after it is
clicked
C. The user's decision about which frog to click
D. The code that generates a random location each time.

Answers

Answer:

D. The code that generates a random location each time.

Explanation:

An algorithm is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

An algorithm is needed to get a random location.

The code that instructs the computer to move the sprite after it is clicked and the code that generates a random location each time are examples of an algorithm in this scenario. The correct options are B and D.

What is algorithm?

A set of instructions or rules that must be followed in order to complete a task or solve a problem is referred to as an algorithm.

The programmer in this scenario used Scratch to create a programme with three frog sprites that respond to user input by making a "boing" sound.

In this scenario, the combination of panels that comprise the Scratch interface and the user's decision about which frog to click are not examples of algorithms.

The panels that make up the Scratch interface are part of the programming environment, but they have no effect on the program's behaviour.

Similarly, the user's choice of which frog to click is a user input, but it does not form part of the algorithm that governs the program's behaviour.

Thus, the correct options are B and D.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

Another word for asking a question of your data is to _____ it.

Answers

Answer:

query

Explanation:

The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.

Answers

802.11n standard uses multiple input/ MIMO technology.output (MIMO) technology to boost performance. Increases the speed of wireless local area network communications, as well as their dependability and range.

What is MIMO technology?

Multiple-Input MIMO Many-Input, Multiple-Output is a wireless technology that uses multiple transmitters and receivers to carry more data at once. MIMO is supported by all 802.11n wireless equipment.

The technology enables 802.11n to achieve faster rates than goods that do not have 802.11n.

Thus, 802.11n standard used for boosting performance in MIMO technology.

For more details about  MIMO technology, click here

https://brainly.com/question/14128610

#SPJ1

Why shouldn’t you add taxes to schools to keep technology in classrooms?

Answers

Answer:

Technology is becoming more expensive and more unhealthy over time, so adding taxes is adding extra funds that don't need to be added. Studies also show that technology in classrooms can cause students' social skills to deficit.

20 Points!
Select the correct answer.
Look at this web page from the National Oceanic and Atmospheric Administration’s (NOAA) website. How does the page use contrast?

a web page on the NOAA website

A.
by providing a search box for users
B.
by using a consistent type of font for all text
C.
by using an image of an actual school of fish
D.
by using lighter font against a darker background

Answers

B. By using a consistent type of font for all text. Hope this helps and have a great day

Answer:

By using lighter font against a darker background

Explanation: Contrast, the state of being strikingly different from something else in juxtaposition or close association! Or opposites for short!

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.







B.






C.






D.


newstyle.css

Answers

Answer:

D

Explanation:

It is D

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.

What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians

Answers

The best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is; As detailed below.

What is a machine algorithm?

Machine learning algorithms are mathematical model mapping methods used to learn or uncover underlying patterns embedded in the data.

Now, Machine learning comprises a group of computational algorithms that can carry out pattern recognition, classification, and prediction on data by learning from existing data set.

In this question, the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available).

Read more about Machine Learning Algorithm at; https://brainly.com/question/21928505

1. The first Pong arcade game in the ______ is considered to be the start of modern video game industry

a) early 60s

b) early 70s

c) early 80s

d) early 90s

Answers

Answer:

B

Explanation:

The first pong game came out November 29, 1972

When reconciling your bank statement with your checkbook, what should you
do first?
O A. Compare deposits.

B. Compare balances.
• C. Compare dates.
• D. Compare checks and withdrawals.

Answers

b All your transactions for the month may not be on your bank statement. Some transactions might have occurred too close to the statement date. Those transactions will appear on the next statement, but are already recorded in your check register.

If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is executed

Answers

  The value of result of the  code segment is executed is known to be 4.

Why is the value of the code segment so?

  When the result of  is not  executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true

  Therefore,   result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the  code segment is executed is known to be 4.

Learn more about scores from

https://brainly.com/question/19492935

#SJ1

Answer:

its 5

Explanation:

I put 4 and got it wrong and checked the test

A network configuration in which connected devices are located in close proximity is called a _____________

Answers

LAN
Local Area Network
A network of devices connected close together over a small geographical are (locally)

Guys please tell me which cable is this?

Answers

Answer:

That might just be an direct internet cable

Explanation:

Answer:

it looks like a baseball bat to me

Explanation:

because if you swing it at someones forehead they will go to the disney park

List a future Internet and a future network technology that interests you. Explain what it is and how it works. Comment on another's post. You must post before you can see other's posts. Internet tech

Answers

LiFi
Data is transmitted via light
You could have streetlights transmit data to cars.
Since you just need the light to be on or off, you can transmit binary bits.
The rate at which lights can flicker is so fast, that the human eye can’t perceive it!
However LiFi technology is an idea that gained popularity I think about four or five years ago. It might be a bit before it becomes a new breakthrough technology!

Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automobile classes override this method. Which class defines the method that is called when the second statement in the code that follows is executed

Answers

The class that defines the method that is called when the second statement in the code that follows is executed is: Automobile.

Automobile class

In a situation where the statement " Automobile car = new Automobile ( )" is executed. The process called instantiation has taken place.

When instantiation occur this indicate or means that object of the automobile class has been created.

An object can tend to be created based on the definition of the class  and the created object can be used to perform or carryout tasks.

Therefore the class that defines the method is: Automobile.

Learn more about automobile class here:https://brainly.com/question/15697747

#SPJ1

The Director of your company is traveling out of the country with the company laptop. Which solution can assist with recovery in the event the laptop is stolen

Answers

What solutions does the question give for you to choose from?
I’d go for backup

13,Which hardware device is used in decoding the machine language version of an instruction in the Instruction Decode stage of the Fetch Execution Cycle

Answers

It should be the control unit

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server

Answers

Answer:

✓ A. Telnet

Explanation:

6.Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?

A. Telnet B. Remote Desktop C. FTP D. SSH

✓ A. Telnet

To make slides in a powerpoint online application presentation have the same transition effect, select __________ on the transition tab. apply to all existing fade none

Answers

Answer: Animations

Explanation:

Transitions, such as fade, can be applied to all using the command Ctrl+A.

Transitions are found under the animations Tab. Sorry about the bots.

Hope This Helped!

Answer:

Apply to all

Explanation:

Jeremy knows that there is a keyboard shortcut in Word, but he does not know what it is. What should Jeremy do to find out what the keyboard shortcut is?

Answers

I think he should ask someone who uses word to help him ;)

Which type of cell references are automatically updated when copied?.

Answers

Answer:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

Explanation:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

_____ collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, non-classified internet protocol router network (NIPRnet).

Answers

Signal intelligence is intelligence gathered by the interception of signals. The blank space will be filled with "SIGINT".

What is SIGINT?

SIGINT is also known as Signal intelligence is intelligence gathered by the interception of signals, whether they be human conversations or technological signals that are not directly utilised in communication. It is a subpart of Intelligence gathering management.

SIGINT collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, and a non-classified internet protocol router network (NIPRnet).

Learn more about SIGINT:

https://brainly.com/question/15710402

#SPJ1

One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs create a disaster recovery plan open online pop-up notifications post personal information online

Answers

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

What is malware?

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

https://brainly.com/question/14276107

#SPJ1

Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology and will be at a disadvantage in life. What could you tell Cameron to reassure him that his sister will still be able to use technology?

Answers

All modern technology has things to help disabled people

What is the primary difference between sort and filter?

Answers

Answer:

Filter only shows the messages that match a particular criterion

what is not an example of ai

Answers

Answer:

human

Explanation:

because it is not a machine

Other Questions
Julia made 7 batches of cookies and ate 3 cookies. There were 74 cookies left. Which expression can be used to determine the average number of cookies per batch? A=74/4B=(74+7)/3C=(74+3)/7D=74/3*7 I WILL GIVE 20 POINTS TO THOSE WHO ANSWER THIS QUESTION RIGHT NOOOO SCAMS AND EXPLAIN WHY THAT IS THE ANSWER In a survey of 800 people, 42% said they shopped online last week. How many people said they shopped online last week? How many solutions does the equation y + 12 = y + 10 + 2 have?ZeroOneTwoInfinitely many Why did senator douglas suggest that congress repeal the missouri compromise?. What is the best summary of this monologue? portia says that if brutus were simply sick, he would do something to get better. As his wife, he has made a promise to her, and she pleads with him to tell her what is on his mind. She also inquiries about the men who were sneaking around their house. Portia pleads with brutus and says that she deserves to know what is wrong. Portia reminds brutus that she owes it to him to be honest when she is worried and to treat him like his other half. Portia tells brutus that his body is healthy. She reminds him that, as his wife and other half, she will stick by him, no matter what happens Select the correct answer.Which value of x makes the equation true? what does belive mean ? people How many times larger is the 5 in 528, 394 as in 352, 107?A. 5 times as large asB. 10 times as large asC. 50 times as large asD. 100 times as large asE. 500 times as large as What is the value of a in the functions equation?A. 3B. -2C. 2D. -3 Solve for x.3x -10 = -5 The sum of the digits of a three digit number is 19. The second digit is one more than the first digit. The thirddigit is two more than the second digit. Find the number.A. 890B. 124C. 345D. 568 5 I think of a number x. If I subtract the number 7 from it, I get the same answer as if I double it and add 3. Find the value of x. When you begin writing, why is it a good idea to complete a first draft without attention to grammar or spelling?5-7 sentences Mountainside communities often have plans in place to keep people safe during a natural disaster. Place the mass movements in order based onthe amount of reaction time the community members will have to get to safety. Start with the mass movement event that gives people the leastamount of time to react. agrument on should free speech be regulated on social media What are at least 3 reasons why the Panama Canal was a significant achievement for the United States(20 points) After so many failed attempts at school why was Charles Darwin finally successful studying at Cambridge One limitation of the Chi Square test (and all tests of hypothesis) is that they cannot tell us if relationships between variables are:_________ A. significant B. random C. by chance D. none of the above In the early 19th century, state governments in the south passed slave codes that