menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other peer to peer communication, A. Hardware Firewall B. Proxy Server …
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other peer to peer communication, A. Hardware Firewall B. Proxy Server …
asked
Apr 22, 2020
196k
views
3
votes
Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
other peer to peer communication,
A. Hardware Firewall
B. Proxy Server
C. Software Firewall
D. GRE Tunneling
Computers & Tech
middle-school
PaulShovan
asked
by
PaulShovan
7.7k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
4
votes
Answer:
the answer would be B proxy server
Jovanna
answered
Apr 27, 2020
by
Jovanna
8.8k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Mar 14, 2019
94.1k
views
Proxy manipulation occurs when a false dhcp server that can provide ip address configuration leases for a unique subnet and define the default gateway because the hacker's computer acts as a mitm router/proxy.
Troy Rockwood
asked
Mar 14, 2019
by
Troy Rockwood
7.9k
points
Computers & Tech
college
1
answer
0
votes
94.1k
views
asked
May 28, 2024
18.4k
views
Andy is a network technician who is preparing to configure a company's network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network.
Oriuken
asked
May 28, 2024
by
Oriuken
8.6k
points
Computers & Tech
high-school
1
answer
4
votes
18.4k
views
asked
Mar 15, 2024
153k
views
You're configuring a firewall to allow access to a server hosted on your network's screened subnet. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured
Jinhua Wang
asked
Mar 15, 2024
by
Jinhua Wang
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
153k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty