A peer-peer (or peer-to-peer) network is called a __________ in Windows terminology.
a. LAN
b. workgroup
c. container
d. domain
b. workgroup
Computer Science & Information Technology
You might also like to view...
Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM B. Honeypot C. DMZ D. Proxy server
Computer Science & Information Technology
?The US-CERT newsletter has alerted you about vulnerabilities in some software installed in your organization. To detect if there is any attempt at exploiting this vulnerability, you would employ ____-based intrusion detection system.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology