1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

What are the differences in LAN and WAN and how they are used to Increase Cybersecurity

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
7 0

Answer:

Local Area Network(LAN):-It is a group of computers usually connected together in a small geographical area for example:-building,office,school etc.

The speed in a LAN is high upto 1000 mbps.

Wide Area Network(WAN):-The computer network which cover a large area.The internet can be a good example of WAN.It consists of LANs and MANs .

The speed is less than LAN upto 150 mbps.

SD-WAN can be used to increase cybersecurity in WANs.

There are different ways in which LAN is used to increase cybersecurity.for ex:-

There are different LANs for ex: wireless security enabled LAN,firewalls installed LAN etc.

The OSI model consists of 7 layers which are as following:-

  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

While TCP/IP consists of less layers than OSI model which are as following:-

  1. Link
  2. Internet
  3. Transport
  4. Application

TCP(Transmission Control Protocol) is the main protocol that run in the layer 4.IP(Internet Protocol) runs under the layer 3.That's why it's named as TCP/IP suite.

You might be interested in
Converting raw data into a more meaningful form is called:
White raven [17]
Converting raw data into a more meaningful form is called: processing
8 0
4 years ago
What is best defined as a phishing email that is targeted directly at you?.
Inga [223]

Answer:

spear phishing hope its right

6 0
3 years ago
What was Ada Lovelace's contribution to computer science?
Alika [10]

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

8 0
2 years ago
Read 2 more answers
1. It is acceptable to use a jack that has been
krok68 [10]
D. None of the above
7 0
3 years ago
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. Wh
fgiga [73]

Answer:

Financial identity theft

Explanation:

Financial identity theft is a fraudulent act that involves accessing someone's personal information without their consent or approval for fraudulent financial gain.

A typical financial identity theft is someone stealing your credit card information such as pin, cvv, etc. to make other financial transactions without your knowledge.

7 0
3 years ago
Other questions:
  • Annabella was giving a presentation to a group of 20 real estate agents on
    15·2 answers
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • Fill in the word to complete the sentence.
    10·1 answer
  • 1. (A) What do you mean by computer? Discuss the use of<br> computer in daily life.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!