1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
14

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby o

f your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement
Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
5 0

Answer:

<u>VLANs</u>

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

You might be interested in
You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
oksano4ka [1.4K]

Step 1 of 4

What command did you use to accomplish this task?

First of all, let us ask ourselves what manual pages or man pages are. Manual pages in Unix/Linux are sometimes referred to as an online form of software documentation. They are a set of pages that try to explain and expound every command available on your system. Further, these pages explain to you the specifics of what each command does and how to run them. And in this case, we can use two commands to search for all the commands that have the word "copy" in their name or description. The commands are “man –k copy” or “apropos copy”

Step 2 of 4

Are there any commands in this list that only a root user can execute? How are they indicated?

Yes. There are several commands in this list that only a root user can execute. If you would want to find out what these commands are, the best way to do that is to look at those manual pages that are indicated by the manual page section number. If it has a number 8, then a root user can execute this command

Let’s compare the cp command and the cpio command

If you do an apropos or a man page on the commands above, you will spot a few differences. The cp command is used to copy files and directories from source to target location while the cpio command copies files to and from archives. The available options are –a –b –d –f –i –l –L –p and several others. On the other hand, the available options for cpio are –0 –a –A –b –B –C –c –d –E and more.

Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos)

affcopy command

NAME

      affcopy - reorder and recompress AFF files

SYNOPSIS

      affcopy [options] file1 file

      affcopy [options] file1 file2 file3 ... dir

      affcopy [options] file1 file2 file3 ... dir1 dir2...

OPTIONS

General options:

             -d     Print debugging information as well.

             -h     Help, print this message.

             -L     Recompress pages (preen) with LZMA (smaller but slower).

             -m     Just copy the missing segments.

bcopy command

NAME

      bcopy - copy byte sequence

SYNOPSIS

      #include <strings.h>

      void bcopy(const void *src, void *dest, size_t n);

DESCRIPTION

      The bcopy() function copies n bytes from src to dest.  The result is correct, even when both areas overlap.

RETURN VALUE

      None.

cifssd command

NAME

      cifsdd - convert and copy a file over SMB

SYNOPSIS

      cifsdd [OPERAND]...

      cifsdd OPTION

DESCRIPTION

      This tool is part of the samba(7) suite.

      Copy a file, converting and formatting according to the operands.

      bs=BYTES

          read and write up to BYTES bytes at a time (default: 4096)

      ibs=BYTES

          read up to BYTES bytes at a time (default: 4096)

      obs=BYTES

          write BYTES bytes at a time (default: 4096)

6 0
3 years ago
A horse is how much percent more powerful than a pony
KatRina [158]
A horse is much percent more powerful than a pony by 1000
4 0
3 years ago
I used the Pearson correlation coefficient for my study to test the correlation and how strong is the relationship between two v
slamgirl [31]

Answer: NO

Explanation:

6 0
3 years ago
Read 2 more answers
Imaging a computer is part of what phase of conversion?
grandymaker [24]
B. Because the computer can rearrange itself when it is in a phase of conversion
5 0
3 years ago
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
kumpel [21]

Explanation:

hope this help here is the answer

3 0
4 years ago
Other questions:
  • Krista needs to configure the default paste options in PowerPoint 2016. Which area of the Options dialog box will she need to us
    14·1 answer
  • An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
    8·1 answer
  • How to find the biggest files on your computer?
    10·1 answer
  • What is a method to exit wordprocessing software
    14·1 answer
  • Which of the following is a correct statement about writing down passwords on a ""cheat sheet?""
    7·1 answer
  • We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult. This is e
    13·1 answer
  • How do you change the number of rows and columns displayed for an embedded Excel object on a PowerPoint slide?
    8·1 answer
  • Which of these terms is a design principle?
    7·1 answer
  • Which feature of REPL.it would you use to transmit your program to a friend?
    12·1 answer
  • What is a survey? plz hel​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!