Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address. Which of the following is an addressing scheme that will work in this situation?

A. Teredo tunneling
B. Private
C. APIPA
D. Classless


Answer: B. Private

Computer Science & Information Technology

You might also like to view...

Suppose that a disk unit has the following parameters: seek time s=20 msec; rotational delay rd=10 msec; block transfer time btt=1 msec; block size B=2400 bytes; interblock gap size G=600 bytes. An EMPLOYEE file has the following fields: SSN, 9 bytes; LASTNAME, 20 bytes; FIRSTNAME, 20 bytes; MIDDLE INIT, 1 byte; BIRTHDATE, 10 bytes; ADDRESS, 35 bytes); PHONE, 12 bytes); SUPERVISORSSN, 9 bytes; DEPARTMENT, 4 bytes; JOBCODE, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r=30000 STUDENT records, fixed-length format, and unspanned blocking. Write down appropriate formulas and calculate the following values for the above EMPLOYEE file:

(a) The record size R (including the deletion marker), the blocking factor bfr, and the number of disk blocks b. (b) Calculate the wasted space in each disk block because of the unspanned organization. (c) Calculate the transfer rate tr and the bulk transfer rate btr for this disk (see Appendix B for definitions of tr and btr). (d) Calculate the average number of block accesses needed to search for an arbitrary record in the file, using linear search. (e) Calculate the average time needed in msec to search for an arbitrary record in the file, using linear search, if the file blocks are stored on consecutive disk blocks and double buffering is used. (f) Calculate the average time needed in msec to search for an arbitrary record in the file, using linear search, if the file blocks are not stored on consecutive disk blocks. (g) Assume that the records are ordered via some key field. Calculate the average number of block accesses and the average time needed to search for an arbitrary record in the file, using binary search.

Computer Science & Information Technology

What is the name of the dynamic process that can be used to automatically build the IPv6 address of a device based on a learned prefix and the local interface MAC address?

A) EUI-64 B) EUI-48 C) SLAAC D) RDU

Computer Science & Information Technology

Which of the following threat scores represents the most secure system?

a. 1 b. 3 c. 5 d. 10

Computer Science & Information Technology

Which of the following color temperature ranges produces light that is considered to have a warm color because it has a yellowish or reddish tint?

a. 2700K to 3000K b. 4000K to 6000K c. 6000K to 7700K d. both B and C

Computer Science & Information Technology