1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
3 years ago
9

What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP add

resses?
Computers and Technology
1 answer:
Colt1911 [192]3 years ago
5 0

Question Completion with options:

The options are :

a. 1000

b . 10000

c. 100

d. 5000

Answer:

The minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP addresses is:

a. 1000

Explanation:

This means that one public IP address can expose 10 Internet of Things (IoT) devices with private IP addresses.  This will make the load lighter and avoid conflicts.  In addition, private IP addresses promote access on a network without taking up the limited public IP address space.  All IoT devices must have their unique IP addresses to communicate through a network.  No two computers or devices on the network should have the same IP address.

You might be interested in
What specific type of DNS query instructs a DNS server to process the query until the server replies with an address that satisf
NeX [460]

Answer: a)Recursive

Explanation: Recursive DNS( Domain Name System) is the server that support the DNS servers in authority.They help in the management of the load that gets produced by the requests from the user. The load  is managed by splitting/distributing so that the website requests becomes supportive and load can be relieved.

Other options are incorrect because they don't revert with the query message   for the DNS servers processing .Thus, the correct option is option(a).

6 0
3 years ago
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
3 years ago
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
87. Labor Department surveys show a close relationship between job<br> security and
faust18 [17]

Answer: office

Explanation:

When there is job, there is security with security,you need an office

8 0
3 years ago
you're troubleshooting an ip addressing issue, and you issue a command to view the system's tcp/ip configuration. the command yo
Leviafan [203]

Based on the above, the operating systems the person is  working on is known to be called Linux.

<h3>What is Linux used for?</h3>

Linux is known to be a kind of an open-source Unix-like operating system that is known to be focused on the Linux kernel, which is said to be a kind of an operating system kernel that was said to have been first released on September 17, 1991.

This was released by a man called by Linus Torvalds. Linux is known to be packaged as a form of Linux distribution. It is said to be used as a Server OS made for web servers, it is also used for database servers, file servers, email servers and others.

Therefore, Based on the the given description above, the operating systems the person is  working on is known to be called Linux.

Learn more about Linux from

brainly.com/question/12853667
#SPJ1

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output:

fxp0: flags=8843&lt;UP, BROADCAST, RUNNING, SIMPLEX, MULTICAST&gt; mtu 1500

inet6 fe80: :2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1

inet 192.168.1.235 netmask 0xfffffx00 broadcast 255.255.255..255

ether 00:a0:83:30:05:7a

media: Ethernet autoselect (100BaseTX &lt;full-duplex&gt;)

status: active

1o0: flags=8049&lt;UP, LOOPBACK, RUNNING, MULTICAST&gt; mtu 16384

inet6 : : 1prefixlen 128

inet6 fe90: : 1%1o0 prefixlen 64 scopeid 0x7

inet 127.0.0.1 netmask 0xff000000

Which of the following operating systems are you working on?

3 0
2 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • An incorrectly spelled word is indicated by _______. a. a red checkmark beside the word b. the word higlighted in yellow c. a re
    8·2 answers
  • Which of the following provides astronomical evidence for the age of the earth?
    11·1 answer
  • Write the equivalent c++ expression for the following algebraic expressions
    11·1 answer
  • Hidden-surface removal is the process of:
    14·1 answer
  • Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression
    11·1 answer
  • How do I use brainly.<br> What is brainliest.<br> And what is the rating thing about
    6·2 answers
  • What programming language does the LMC 'understand'?
    5·1 answer
  • if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should yo
    6·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!