1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
4 years ago
12

Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th

e servers do not have to communicate with each other although they are located on the same subnet. Both servers need to communicate with the data server that is located on the inside network. Which configuration will isolate the servers from inside attacks?
a.Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN promiscuous ports.
b.Ports Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN community ports.
c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.
d.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN community ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.
Computers and Technology
1 answer:
BigorU [14]4 years ago
3 0

Answer:

c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Explanation:

Primary VLANs which can only be reached by using promiscuous port, comprises of the gateway and isolated VLANs for users to get out of a network.

The isolated ports can only communicate i.e send and receive data with the promiscuous ports; Fa3/34 and Fa3/35.

Also, WS_1 and WS_2 can neither send nor receive data with the data server, thus we isolate them.

You might be interested in
How to create a shortcut to a website on your desktop?.
dusya [7]

Answer:

open web browser, open your favorite website or webpage, right click on the web address located in the address bar of your web

3 0
2 years ago
Student B, lives in Phoenix, Arizona and is not on vacation. Student B, submits an assignment for science class and the teacher
frozen [14]

Answer:

Don't take this for your answer though, but no unless the student copied it off of somewhere else.

The IP address might have been spoofed or they could have used a vpn.

Otherwise it would mean that someone else used their account to sign in.

Explanation:

7 0
2 years ago
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
Ad libitum [116K]

Answer:

a) all cabling hope it helps

3 0
3 years ago
Create a program to compute the fee for parking in a garage for a number of hours. The program should: 1. Prompt the user for ho
Harman [31]

Answer:

The ans will be given in the python script below. A picture of the answer is also attached

Explanation:

print("Welcome To Garage Parking Fee Calculator")

hours = float(input("Type the number of hours parked :  "))

#fee per hour

rate = 2.40

#multiply rate per hour by the number of hours inputted

price = rate * hours

if price < 6:

   price = 6

if price > 20:

   price = 20

print("Parking fee is:  $", +price)      

7 0
3 years ago
What is cloud data storage?
bearhunter [10]
Cloud data storage is a model of data storage in which data is managed and backed up on a network.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Help me learn how to code
    9·2 answers
  • What is the area of a triangle whose base is 14 m and whose height is 22 m?
    7·1 answer
  • "someone has tampered with your computer and erased data". what kind of computer threat is this
    11·1 answer
  • Ron travels extensively. He posts articles, photos, and videos about his experiences on a website. Which type of electronic comm
    9·1 answer
  • Which best describes what Pavel should do differently for the kids book?
    13·2 answers
  • Changes in computer technology have an effect on _____. computer scientists only people who work with computers only everybody p
    12·2 answers
  • What do space stations, artificial organs, supersonic aircraft, and "high-tech”
    10·1 answer
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • A client is currently struggling with late-stage integration and manual deployments. They want to find another method that will
    5·1 answer
  • (Correct Answer Recieves Brainliest)
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!