Match each term with the correct statement below.

A. Originally designed for UNIX environments for point-to-point communications among computers, servers, and hosts using TCP/IP
B. A starting-to-ending-point encryption technique that uses special encryption keys varying in length from 40 to 128 bits
C. A WAN communications technology that relies on packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps
D. Like a tunnel through a larger network-such as the Internet, an enterprise network, or both-that is restricted to designated member clients only
E. Encapsulates the data packet in the Hypertext Transfer Protocol (HTTP) used through Web communications
F. A technology that uses advanced modulation techniques on regular telephone lines for high-speed networking at speeds of up to about 52 Mbps between subscribers and a telecommunications company
G. A dedicated leased telephone line that can be used for data communications over multiple channels for speeds of up to 400.352 Mbps
H. A data encryption technique employed between a server and a client, such as between a client's browser and an Internet server
I. Can automatically negotiate communications with several network communications layers at once


A. SLIP
B. MPPE
C. frame relay
D. VPN
E. SSTP
F. DSL
G. T-carrier
H. SSL
I. PPP

Computer Science & Information Technology

You might also like to view...

Division requires that each nonzero element have a(n) __________ inverse.

A. multiplicative B. divisional C. subtraction D. addition

Computer Science & Information Technology

The following program invokes p() three times. What is the printout from the last call of p()?

``` #include using namespace std; int j = 40; void p() { int i = 5; static int j = 5; i++; j++; cout << "i is " << i << " j is " << j << endl; } int main() { p(); p(); p(); } ``` a. i is 6 j is 8 b. i is 6 j is 6 c. i is 6 j is 9 d. i is 6 j is 7

Computer Science & Information Technology

Which of the following is a type of action that has the potential to cause harm?

A. asset B. vulnerability C. threat D. threat agent

Computer Science & Information Technology

________ is very useful where you can view and print only the desired and required information from your database

A) Custom formatting B) Filtering C) Sorting D) Formatting

Computer Science & Information Technology