What type of network does not have centralized control, such as one in a small office or home office?
A. client server network
B. star topology
C. peer-to-peer (P2P)
D. hub network
Answer: C
You might also like to view...
DNS servers cache name and address pairs for addresses they resolved, and they keep information about name requests that result in error messages. What is this information called?
A. DNS round robin B. name resolution C. negative caching D. IP spoofing
Network Diagram printouts can be quite wide, so you might want to move tasks in order to better arrange them for printouts.
Answer the following statement true (T) or false (F)
Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?
a. Intrusion forensics b. Network forensics c. DDoS forensics d. Traffic forensics
____________are sets of rules and procedures that dictate communication and behavior.
Fill in the blank(s) with the appropriate word(s).