While Lauren is monitoring traffic on two ends of a network connection, she sees traffic that is inbound to a public IP address show up inside the production network bound for an internal host that uses an RFC 1918 reserved address. What technology should she expect is in use at the network border?

A. NAT
B. VLANs
C. S/NAT
D. BGP


Answer: A. NAT

Computer Science & Information Technology

You might also like to view...

Match the following terms with their description

I. Record A. Inserts a new blank page at the end of the document II. Parenthetical citation B. Used to generate a detailed bibliography III. Manual page break C. Title used on an MLA bibliography page IV. Works cited D. Citations indicated in an abbreviated manner V. Bibliography database E. Where each data source is stored

Computer Science & Information Technology

The Insert Outline dialog box is accessed from the New Slide button arrow from the ________ tab

A) Home B) Insert C) Design D) File

Computer Science & Information Technology

UML is the industry standard software design notation for modeling systems using object-oriented concepts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following best describes the licensing-model used by Windows Server 2016 Standard and Datacenter editions?

A. User-based B. Server-based C. core-based D. processor-based

Computer Science & Information Technology