1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

What are the differences in LAN and WAN and how they are used to Increase Cybersecurity

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
7 0

Answer:

Local Area Network(LAN):-It is a group of computers usually connected together in a small geographical area for example:-building,office,school etc.

The speed in a LAN is high upto 1000 mbps.

Wide Area Network(WAN):-The computer network which cover a large area.The internet can be a good example of WAN.It consists of LANs and MANs .

The speed is less than LAN upto 150 mbps.

SD-WAN can be used to increase cybersecurity in WANs.

There are different ways in which LAN is used to increase cybersecurity.for ex:-

There are different LANs for ex: wireless security enabled LAN,firewalls installed LAN etc.

The OSI model consists of 7 layers which are as following:-

  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

While TCP/IP consists of less layers than OSI model which are as following:-

  1. Link
  2. Internet
  3. Transport
  4. Application

TCP(Transmission Control Protocol) is the main protocol that run in the layer 4.IP(Internet Protocol) runs under the layer 3.That's why it's named as TCP/IP suite.

You might be interested in
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
When you log into quickbooks online account whose books can you directly access and manage?
MArishka [77]

Answer: your books and the ones you are given access to.

Explanation: quickbooks goes from day to day bookkeeping to month and year end financial reports and tax filing. businesses use to manage daily sales and expenses and also keep track of daily transactions. They can involve or outsource bookkeepers or choose to run in-house operations. In doing this they would have access to all their books or decide to give virtual access to their outsourced bookkeeper/accountant. Quickbooks has multiple features concerning user access and privacy. A quick books user, in this case the business, can restrict access for each user it decides to add. The user can decide to give free access to all books or decide to restrict to a few files. Example, the business may add an accountant as one of its users and decide to restrict the accountant to its payroll files, depending on the agreement.

3 0
3 years ago
If you were looking for a record in a very large database and you knew the ID number, which of the following commands would be t
OLga [1]

Answer:

The Correct answer is Find.

Explanation:

7 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
3 years ago
50 POINTS
mars1129 [50]

Answer:

B. Ctrl+H

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • how do you define technological world is a easier way for this low iq girl to understand its for my essay pls help me im about t
    15·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    9·1 answer
  • (Palindrome integer) Write the methods with the following headers // Return the reversal of an integer, i.e., reverse(456) retur
    9·1 answer
  • Call 334-399-4201 to annoyed my mom
    13·1 answer
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • 3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
    10·1 answer
  • Wrtie down some containerization technology.
    11·1 answer
  • The executive ________ is the person ultimately responsible to their company for the project's success.
    13·1 answer
  • If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every pla
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!