Broadcast traffic is having a negative impact on network performance. Which of the following might help minimize this issue?

A. Use NAT to hide the IPs of each of the workstations.
B. Separate the network onto a number of different switches.
C. Separate the network into a number of different VLANs.
D. Route all the Unicast traffic through the proxy server.


Answer: C. Separate the network into a number of different VLANs.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. In distributed computing, an organization’s computing is distributed over networks to the sites where the organization’s work is being performed. b. In distributed computing, an organization’s computing is performed at a central computer installation. c. In distributed computing, an organization’s computing is handled by a computer distributor. d. None of the above.

Computer Science & Information Technology

_________ is the kernel subsystem that manages modules without user interaction

a) lkm b) kloadmod c) kmod d) kautoload

Computer Science & Information Technology

“It’s hard to focus on what we want to achieve. I look at what our real competitors, the convenience stores, are doing and think we should copy that. Then a hundred customers come in, and I listen to each of them, and they say we should keep our little store the same, with friendly clerks and old-fashioned cash registers. Then, when I pick up a copy of SuperMarket News, they say that the wave of the future is super grocery stores, with no individual prices marked and U P C scanners replacing clerks. I’m pulled in so many directions I can’t really settle on a strategy for our grocery store,” admits Geoff Walsham, owner and manager of Jiffy Geoff’s Grocery Store. In a paragraph, apply the concept of permeable organizational boundaries to analyze Geoff’s problem in focusing on organizational

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements best describes a Trojan?

A. Malicious software that hides into the lower levels of the operating system and opens a backdoor B. Malicious software that records every key stroke and mouse movement C. Malicious software that disguises itself as a legitimate program D. Malicious software that takes the computer data hostage to extort money

Computer Science & Information Technology