157k views
3 votes
you have been given a laptop to use for work. you connect the laptop to your company network, use the laptop from home, and use it while traveling. you want to protect the laptop from internet-based attacks. which solution should you use? answer vpn concentrator

User LMulvey
by
8.0k points

2 Answers

4 votes

Final answer:

To protect your laptop from internet-based attacks, use a VPN concentrator to create a secure connection between your laptop and the company network.

Step-by-step explanation:

To protect your laptop from internet-based attacks while using it on different networks, you should use a VPN concentrator.

A VPN (Virtual Private Network) concentrator is a device that creates a secure connection between your laptop and the company network. It encrypts your data and hides your IP address, making it difficult for hackers to intercept your information.

By using a VPN concentrator, you can ensure the security and privacy of your laptop while accessing the internet from different locations.

User Rawand Deheliah
by
7.2k points
3 votes

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. The solution you should use is to use option d: Host based firewall.

A VPN concentrator is a secure device that creates a virtual private network (VPN) to protect your laptop from internet-based attacks.

Host-Based Firewall is known to be a technology that helps to provides a specific defense mechanism on the laptop itself.

So, A host-based firewall runs on the laptop and monitors the traffic specifically to and from that device. It adds an extra layer of protection directly on the laptop, helping to prevent unauthorized access and blocking potentially malicious activities.

See text below

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.

You want to protect the laptop from Internet-based attacks.

Which solution should you use?

VPN concentrator

Proxy server

Network based firewall

Host based firewall

User Nullpotent
by
8.5k points

No related questions found