A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.
A. gateway
B. router
C. hub
D. data switch
Answer: A
You might also like to view...
Conditions in a query that are used to answer a query's question is called ________
Fill in the blank(s) with correct word
Which wireless network penetration utility implements deauthentication DoS attacks against 802.11 protocol?
a. Kismet b. Void11 c. THC-wardrive d. Airsnarf
Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.
_____ 1. A group of sectors where files are stored on a disk. _____ 2. A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks. _____ 3. The action or attack by a computer virus or malware. _____ 4. A form of malware that prevents you from using your computer until you pay a fine or fee. _____ 5. A concentric circle created on a disk during low-level disk formatting. _____ 6. An anonymous, digital, encrypted currency. _____ 7. A software update that addresses individual problems as they are discovered. _____ 8. A form of self-replicating malware that does not need a host to travel. _____ 9. A setting that disables or turns off all network adapters on a device. _____ 10. A process that occurs as files are broken into small pieces that are stored in nonadjacent or noncontiguous clusters on the disk. A Airplane mode B Bitcoin C Cluster D Computer zombie E File fragmentation F Hotfix G Payload H Ransomware I Track J Worm
Which of the following lets you view each defined page element in a tree diagram or structure?
A. View Now button B. View Elements button C. Element Diagram button D. Element Quick View button