While Lauren is monitoring traffic on two ends of a network connection, she sees traffic that is inbound to a public IP address show up inside the production network bound for an internal host that uses an RFC 1918 reserved address. What technology should she expect is in use at the network border?

A. NAT
B. VLANs
C. S/NAT
D. BGP

Answer: A. NAT

Computer Science & Information Technology

You might also like to view...

The ________ operator can be used to calculate the number of records within a group

Fill in the blank(s) with correct word

Computer Science & Information Technology

You should use the _____ data type for fields that contain words and symbols of up to 255 characters in length.

A. Short Text B. Long Text C. Number D. AutoNumber

Computer Science & Information Technology