While Lauren is monitoring traffic on two ends of a network connection, she sees traffic that is inbound to a public IP address show up inside the production network bound for an internal host that uses an RFC 1918 reserved address. What technology should she expect is in use at the network border?
A. NAT
B. VLANs
C. S/NAT
D. BGP
Answer: A. NAT
Computer Science & Information Technology
You might also like to view...
The ________ operator can be used to calculate the number of records within a group
Fill in the blank(s) with correct word
Computer Science & Information Technology
You should use the _____ data type for fields that contain words and symbols of up to 255 characters in length.
A. Short Text B. Long Text C. Number D. AutoNumber
Computer Science & Information Technology