answersLogoWhite

0

What else can I help you with?

Related Questions

What is the main reason imagenie should implement desktop security measures on their network client computers?

To reduce or eliminate costs that can result when end users manipulate PC's and other network resources, or when unauthorized USERS ACCESS NETWORK RESOURCES


Which authentication model should you implement to ensure that once users are authenticated with their username and password they are able to access all the resources they need on the network?

SSO (single sign on) allows a person to access all the resources they need after they have authenticated once.


Why should you map a network drive rather than just access your network resource from the network group in windows explorer?

Well, mapping a network drive can make it easier for you to access your network resources quickly and efficiently. It allows you to assign a drive letter to the network location, making it feel like a part of your computer. This can save you time and make it more convenient to work with your files and folders on the network.


What are advantages and disadvantages of linked storage?

Advantage everyone on the network should have access. The disadvantage is that if the network storage is not security protected anyone could gain access


What is the network devices recommended to be assigned a static ip address?

Routers, Access Points, Printers... Every device you will need to access sooner or later...computer can stay with Dynamic IP's since they should show their name in network, but routers, access points, printers, while they may show its not guaranteed.


What is the purpose of the tcp ip network access layer?

With regard to the TCP/IP Network Model, the network access Layer is the lowest logical layer in the model and provides specifications for how data (bits) should move over the network.


What is the use of User accounts and Groups?

User accounts and groups are useful for determining who can access various resources on a network. There may be a large number of files and folders that certain individuals should be able to modify and which others should be able to read but not be allowed to change. Assigning permissions to individual users allows a network administrator to control who can read or modify certain files and folders. They can also be used to control access to other network resources, such as printers. Assigning individual permissions to large numbers of people where large numbers of network resources exist can be time consuming. This is where groups are useful. Rather than setting each individual's permissions for each network resource, the group is set permissions, then users are assigned as members of groups. In this way the group permissions can be modified as network resources change and users can be moved from one group to another (or be made members of multiple groups) which will save time and reduce mistakes.


Link aggregation should be implemented at which layer of the hierarchical network?

access, distibution and core


Which layers should support QoS in a hierarchical network?

the access, distribution, and core layers


Which access control model should you use to grant access to resources in order to ensure the highest level of security?

MAC


Can you access xfinity wifi hotspots immediately after purchase?

Yes, you should be able to see them on your network.


What Port should a terminal emulator be connected to in order to access a router withot network connectivity?

console