1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
10

A network administrator wants to logically separate web servers on the network. Which of the following network device will need

to be configured?
a. Router
b. Switch
c. Hub
d. Bridge
Computers and Technology
2 answers:
stealth61 [152]3 years ago
8 0

Answer:

Switch

Explanation:

As the network administrator wants to logically separate web servers on the network, a Switch can be used to achieve this. A Switch has to be configured on the network to achieve this. So, option (b) is correct. Option (a) Router is false as the purpose of a router is to connect multiple networks and route the packets in the network group. Option (c) Hub is used for different purpose and not for this. Similarly, option (d) Bridge is not used for this purpose.

mihalych1998 [28]3 years ago
3 0

Answer:

Option b. Switch

Explanation:

The web servers can only be separated by means of switch. The switch is a series of systems that separate the web servers on the internet. This is done for efficient connectivity on the server network.

You might be interested in
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
ololo11 [35]
<span>Net View is the command issue from a command prompt to see a listing of the computers in your workgroup.It will display the list of domains,computers resources which have been shared by the specified computer then it will list all computers currently in our domain.The syntax for net view using command prompt NET VIEW [\\computername [/CACHE] | [/ALL] | /DOMAIN[:domainname]].</span>
8 0
3 years ago
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
What occurs when information is copied from an internet source to another computer?
Margarita [4]
The answer is pasting
3 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
This is due in like an hour but I'm confused so please do lend assistance
blagie [28]
Yes you do have to program it first.
4 0
3 years ago
Other questions:
  • Does Logarithms and Algorithms same things?
    6·1 answer
  • The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
    6·1 answer
  • 10.
    13·1 answer
  • tuition $36,620 room and board $12,900 books and fees $2,450 transportation $3,100 other $1,330 . Emily is using the table to de
    8·2 answers
  • WILL UPVOTE NEED ANSWERS ASAP i have till 4:30
    12·1 answer
  • What would happen if you clicked on the Show Desktop icon on your computer screen? The system tray would appear. All open window
    9·2 answers
  • ________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
    10·1 answer
  • which one of the following word process feature saves you the most time when you keying in a document
    9·1 answer
  • Explain the computer according to size​
    10·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!