____ is the practice of dividing the network into smaller units.

A. Switching
B. Segmentation
C. VLANs
D. Filtering


Answer: B

Computer Science & Information Technology

You might also like to view...

You can quit a program by __________.

a. opening the File menu and selecting Exit b. clicking on the X button (the rightmost button) at the window’s upper right c. either A or B d. neither A nor B

Computer Science & Information Technology

Whenever you open a file, the History panel creates a(n) ____________________ at the top of the panel representing the status of the file at the time it was opened.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A security administrator has been assigned to review the security posture of the standard corporate system image for virtual machines. The security administrator conducts a thorough review of the system logs, installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user accounts, the security administrator determines that several accounts will not be used in production.Which of the following would correct the deficiencies?

A. Mandatory access controls B. Disable remote login C. Host hardening D. Disabling services

Computer Science & Information Technology

The Opacity slider measures opacity in ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology