Which of the following is not a controlled access method of media access control?
a. Token passing
b. CSMA/CD
c. polling
d. roll call polling
e. hub polling
Answer: b. CSMA/CD
You might also like to view...
________ computers are specially designed computer chips that reside inside other devices such as a car
A) Tablet B) Netbook C) Embedded D) Desktop
As an experienced digital investigator, you have been called in to testify about the reliability of the tool that was used to extract a forensic image. In your testimony you explain that you tested the utility against several _________________
a. Captured suspect drives b. Virtual drives c. Known data sets d. Archived image files
Answer the following statement(s) true (T) or false (F)
By using marketing to attract new customers or clients, you can justify future budgets for the lab’s operation and staff.
A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed?
A. Implement an environment to test the enhancements. B. Implement ACLs that only allow management access to the enhancements. C. Deploy an IPS on the production network. D. Move the software team's workstations to the DMZ.