Jane, a user, has an IP address of 172.16.24.43 and visits a website which states that she has an IP address of 204.211.38.89. Which of the following is being used on the network?
A. NAT
B. NAC
C. Spoofing
D. DMZ
E. VLANs
F. PAT
Answer:
A. NAT
F. PAT
You might also like to view...
In the NTFS file system, the user content stored within the file is treated as _______________________
a. The object b. An attribute c. A security function d. A meta-link
When you use the ____ property on an element, you can set the attribute to float left or right.
A. location B. float C. align D. margin
The managerial tutorial equivalent of NIST SP 800-12, providing overviews of the roles and responsibilities of a security manager in the development, administration, and improvement of a security program, is NIST __________.
A. SP 800-100: Information Security Handbook: A Guide for Managers (2007) B. SP 800-18, Rev. 1: Guide for Developing Security Plans for Federal Information Systems (2006) C. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems (1996) D. SP 800-110, Rev. 1: Manager's Introduction to Information Security (2016)
Which layer of the OSI model is the only layer divided into two sublayers?
A. Transport B. Network C. Data Link D. Physical