Question

Question 19 2 out The routing table typically contains only the address of only the next router but not the all the known netA VPN is used primarily to support secure communications over a trusted network. Answers: True False

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question 19 FALSE

The routing table contains only the address of only the next router but not the all known network.

In networking, a routing table is a data table stored in a router or a network host that lists the routes to particular network destinations. Routing table stores many type of information necessary to forward a packet along the best path toward its destination. Routing table stores IP addresses of all those routers which are required to reach the destination network.

*********************************************************************************************************************************

Question 20 TRUE

With the advanced ACL category, it is also possible to examine both the source address and destination address to determine whether or not to allow a packet to pass

An Access Control List (ACL) is a set of rules that is usually used to filter network traffic. ACLs can be configured on network devices with packet filtering capatibilites, such as routers and firewalls.extended access lists – allow you to evaluate the source and destination IP addresses, the type of Layer 3 protocol, source and destination port, and other parameters.

***********************************************************************************************************************************

FALSE

A VPN is used primarily to support secure communications over a trusted network.

A virtual private network (VPN) extends a private/trusted network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private/trusted network. So VPN is used to support secure communication over a public/untrusted network.

Please give me like. Thank and Regards.

Add a comment
Know the answer?
Add Answer to:
Question 19 2 out The routing table typically contains only the address of only the next...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • please give me a reason to explaine why I'm not correct!thanks Question 25 O out of...

    please give me a reason to explaine why I'm not correct!thanks Question 25 O out of 0.3 points An Exploiter firm is more likely to Selected Answer: provide minimal constraints on resources Answers: provide minimal constraints on resources have a flat organization have central control over all operations have a flexible staff All of the listed Question 27 0.3 out of 0.4 points Business Process Outsourcing is an important management decision in reducing cost and improving weaknesses. Match the following...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT