1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
6

Can i configure my entire network as a dmz

Computers and Technology
1 answer:
Ymorist [56]3 years ago
6 0
No - only one device
You might be interested in
A favorable variance indicates that​ ________. A. actual operating income is less than the budgeted amount B. budgeted contribut
shusha [124]

Answer:

The answer is "Option C".

Explanation:

An undesirable change occurs when an actual net profit is below or below the level of performance predicted. It exists when total net profit is above what we expected or when income is below our average. In the given question the other options are not correct that can be described as follows:

  • In option A, Actual income shall not be less than the target
  • In option B, The estimated margin must not be greater than the current amount.
  • In option D, The expense estimate is lower than the actual cost.

6 0
3 years ago
What type of DNS server is not configured with any zones, but fields DNS queries and sends iterative queries to upstream DNS ser
SpyIntel [72]

Answer:

Authoritative server.

Explanation:

DNS is an application layer protocol of the OSI and the TCP/IP suite network model. It is called the domain name server, as it helps client host to lookup or resolve domain name to IP addresses. An example of a DNS server is the authoritative server.

The authoritative server is a zone-less server that fields DNS queries and sends iterative queries to other DNS servers and stores the result.

8 0
3 years ago
Read 2 more answers
Which PowerPoint options can users customize?
Zielflug [23.3K]

Answer:

Customized Toolbar,  theme, design, autosave file location, ribbon tabs and groups, quick access buttons, username

Explanation:

5 0
4 years ago
Which two standards below represent newer versions of stp??
valina [46]
Standard Tree Protocol (STP) is a networking protocol that was made by Radia Perlman. It makes a single path over a network, averting any loops from happening. Even if there are multiple paths to the same destinations. It has two never versions which is 802.1s and 802.1w.
8 0
3 years ago
When you connect to your isp's pop, the isp and the equipment at the pop go through a process called _________, establishing the
trasher [3.6K]
ISP stands for Internet Service Provider and it's the company that provides the connections to access the Internet.<span>When you connect to your ISP's pop, the ISP and the equipment at the pop go through a process called handshaking, establishing the speed of the internet connection, and then proceed to authentication. Handshaking is the exchange of signals between devices in order to regulate the data transfer. Authentication is the </span><span>verifying of the identity of a user or process.</span>
3 0
3 years ago
Other questions:
  • What is the intranet?
    12·1 answer
  • Which traits do human embryos have that link them to a common ancestor with fish and reptiles?
    10·2 answers
  • Which of the following is not a good way to conserve fuel and reduce emissions?
    13·2 answers
  • HELP ASAP. Which of the following best describes the path of a network packet on the Internet? I think it's (A)
    7·2 answers
  • When enter a function or formula in a cell, which is the character you must type?
    14·1 answer
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • To save time and avoid formatting errors, you can use the__ to apply custom formatting to other places in your presentation and
    13·1 answer
  • -How long does a copyright last?
    6·1 answer
  • Which skills will help Harry in the following scenario? Harry works in a software development company. He starts a new project f
    9·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!