How can an administrator create subnets, or broadcast domains, on a single external or internal virtual switch?

A. Virtual NICs
B. Virtual LANs
C. Virtual switches
D. Virtual segments


Answer: B

Computer Science & Information Technology

You might also like to view...

Create a World object and a Turtle object and use the Turtle object to draw an arrow.

What will be an ideal response?

Computer Science & Information Technology

All of the following are true about a macro in Word EXCEPT ________

A) it automates repetitive tasks B) it can record your keystrokes C) it can only be used once D) it can be deleted

Computer Science & Information Technology

The following program uses function multiple to determine whether the integer entered from the keyboard is a multiple of some integer X. Examine function multiple, then determine the value of X.

``` // This program determines if a value is a multiple of X. #include using namespace std; bool multiple( int ); int main() { int y; cout << "Enter an integer between 1 and 32000: "; cin >> y; if ( multiple( y ) ) cout << y << " is a multiple of X" << endl; else cout << y << " is not a multiple of X" << endl; } // end main // determine if num is a multiple of X bool multiple( int num ) { bool mult = true; for ( int i = 0, mask = 1; i < 10; i++, mask <<= 1 ) if ( ( num & mask ) != 0 ) { mult = false; break; } // end if return mult; } // end function multiple ```

Computer Science & Information Technology

What is meant by the term recoverability?

A. how often a security solution or device must be updated and how long the updates take B. the amount or percentage of time a computer system is available for use C. the probability that a failed security solution or device can be restored to its normal operable state within a given timeframe using the prescribed practices and procedures D. making a security solution or device easier to use and matching the solution or device more closely to organizational needs and requirements

Computer Science & Information Technology