Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()

  • A、VLAN
  • B、Peer to Peer
  • C、VTP
  • D、VPN

相关考题:

When a computer does not recognize an internal modem, a technician should determine whether:()A、the modem is seated properly.B、the number being dialed is valid.C、there are resource conflicts.D、there is power to the modem.E、the modem speaker is enabled.

A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A、Zip driveB、15,000 rpm SATAC、7,200 rpm IDED、USB flash

Which of the following would be the maximum number of devices in a single chain that USB technology will allow?()A、98B、127C、254D、120

When using Device Manager, a red ‘X” indicates which of the following?()A、Device is disabledB、Device conflictC、No device driver foundD、Device has not been digitally signed

Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

Which of the following is the FIRST thing that should be done in order to begin reinstalling TCP/IP on the server?()A、 Configure netsh settings in case of backupB、 Restart the serverC、 Notify usersD、 Uninstall TCP/IP

Which of the following is a multimedia device?()A、Biometric deviceB、MouseC、CamcorderD、Infrared scanner

Which of the following are features of server virtualization software?()A、Larger bandwidth utilizationB、Increased application performanceC、Reduce resource utilizationD、Reduce TCOE、Rapid server provisioning

Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages

Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS

A client reports that the laptop is not performing a complete charge of the battery. Which of the following actions should be taken FIRST? ()A、Update the BIOS.B、Run the battery calibrator.C、Reinstall the ACPI drivers.D、Replace the power adapter.