Match each item with a statement below.

A. Computers with two network adapters
B. A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
C. Can be used to combine the bandwidth of two network adapters
D. The ability of a computer or a computer network to keep operating in the event of a hardware failure
E. The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server


A. Multi-homed
B. Intrusion Detection System
C. Link aggregation
D. Fault tolerance
E. Hardening

Computer Science & Information Technology

You might also like to view...

List the constraints that determine the number and size of networks.

What will be an ideal response?

Computer Science & Information Technology

The HLOOKUP function

A) calculates the periodic payment for a loan with a fixed interest rate and fixed term. B) looks up a value in a lookup table where the first column contains the values to compare with the lookup value. C) looks up a value in a lookup table where the first row contains the values to compare with the lookup value. D) is the periodic interest rate, such as a monthly interest rate.

Computer Science & Information Technology

Which of the following is most likely used to troubleshoot an IEEE 1394 device?

A) Multimedia control panel B) Scanners and cameras control panel C) Task Manager D) Device Manager

Computer Science & Information Technology

Which of the following methods uses familial reference to loop through a collection of child nodes?

A. for (var n = node.firstChild; n !== null; n = n.nextSibling) {commands} B. for (var n = node.firstChild; n !== null; n = n.previousSibling) {commands} C. for (var n = node.firstChild; n !== null; n = n.firstChild) {commands} D. for (var n = node.firstChild; n !== null; n = n.lastChild) {commands}

Computer Science & Information Technology