FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?
A
Stateful packet filtering
B
Load balancing
C
DNS caching
D
DNS poisoning
Explanation: 

Detailed explanation-1: -POP3 and IMAP are handling the incoming emails and they operate in different ways to retrieve or access your email messages. Thus, they are considered mail access protocols. On the other hand, the Simple Mail Transfer Protocol is behind the message transfer from server to server, or mail client to server.

Detailed explanation-2: -What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users? A security advantage of VLANs is that they can be used to prevent direct communication between servers.

Detailed explanation-3: -Which of the following is a common way to establish security between a web server and a network? Put a firewall between the web server and the network.

Detailed explanation-4: -An SVC interrupts the program being executed and passes control to the supervisor so that it can perform the service. Programs request these services through macros such as OPEN (open a file), GETMAIN (obtain storage), or WTO (write a message to the system operator).

There is 1 question to complete.