A peer-peer (or peer-to-peer) network is called a __________ in Windows terminology.

a. LAN
b. workgroup
c. container
d. domain

b. workgroup

Computer Science & Information Technology

You might also like to view...

Which of the following is a vulnerable system designed to detect and log unauthorized access?

A. SIEM B. Honeypot C. DMZ D. Proxy server

Computer Science & Information Technology

?The US-CERT newsletter has alerted you about vulnerabilities in some software installed in your organization. To detect if there is any attempt at exploiting this vulnerability, you would employ ____-based intrusion detection system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology