Jane, a user, has an IP address of 172.16.24.43 and visits a website which states that she has an IP address of 204.211.38.89. Which of the following is being used on the network?

A. NAT
B. NAC
C. Spoofing
D. DMZ
E. VLANs
F. PAT


Answer:
A. NAT
F. PAT

Computer Science & Information Technology

You might also like to view...

In the NTFS file system, the user content stored within the file is treated as _______________________

a. The object b. An attribute c. A security function d. A meta-link

Computer Science & Information Technology

When you use the ____ property on an element, you can set the attribute to float left or right.

A. location B. float C. align D. margin

Computer Science & Information Technology

The managerial tutorial equivalent of NIST SP 800-12, providing overviews of the roles and responsibilities of a security manager in the development, administration, and improvement of a security program, is NIST __________.

A. SP 800-100: Information Security Handbook: A Guide for Managers (2007) B. SP 800-18, Rev. 1: Guide for Developing Security Plans for Federal Information Systems (2006) C. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems (1996) D. SP 800-110, Rev. 1: Manager's Introduction to Information Security (2016)

Computer Science & Information Technology

Which layer of the OSI model is the only layer divided into two sublayers?

A. Transport B. Network C. Data Link D. Physical

Computer Science & Information Technology