1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
2 years ago
13

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired

five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Computers and Technology
1 answer:
aleksklad [387]2 years ago
3 0

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

You might be interested in
Rain forests clean the air by producing oxygen. Some rain forest plants have healing properties, and can be used as medicine. Ra
Alla [95]

Answer:

The answer is C. Rain Forests are important for many reasons

Explanation:

7 0
2 years ago
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
sweet-ann [11.9K]

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

3 0
3 years ago
Two or more computers that are linked together are called which of the following
bekas [8.4K]
I’m pretty sure it’s a network hope this helps
8 0
3 years ago
What are the home row keys?
kramer
ASDF JKL; are the home row keys.
7 0
3 years ago
Other questions:
  • What is the main storage device where the computer stores data?
    15·1 answer
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • Whats the difference between copying a file to my desktop and creating a shortcut?
    8·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • Eye wash stations should contain enough water to provide ______ minutes of continuous use
    5·2 answers
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • How many constructors are there in the following class declaration?class CashRegister { public: CashRegister(); CashRegister(int
    8·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • PowerPoint is best described as:
    13·1 answer
  • Please please help I don’t understand
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!