answersLogoWhite

0


Best Answer

Hubs and Switches

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

15y ago

Tsk, Tsk , Take the Cisco Test

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

layer 2...

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which two networking devices are used to connect hosts to the access layer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is the function and purpose of authentication services?

Authentication services are used to determine infusers are who they claim to be and are allowed to access what they are trying to access. The purpose of authentication is to protect devices, hosts, and services of a network. Authentication ensures the identity of the entity wanting access. Authentication is the process of determining if a user or identity is who they claim to be. The main goal of authentication is security, authentication is one of the first lines of defense in networking.


What is the difference between WAP and WLAN?

WAP is an abbreviation for Wireless Access Point, provided by an Integrated Services Router (ISR). Laptop computers and other various devices with wireless capabilities may be able to connect to the internet on this wireless connection. WLAN is an abbreviation for Wireless Local Area Network. Multiple wireless hosts are able to easily connect with one another when they are all on the same WLAN.


Ould a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?

No, end devices cannot have .0 address assigned to them. It loosely refers to the entire network subnet.


What file can be replaced when a network has a DNS server?

Hosts


What steps can you take to minimize the possibility of IP spoofing on your network while still allowing INternet access for internal hosts?

To minimize the risk of IP spoofing on your network while maintaining internet access for internal hosts, consider implementing the following measures: First, enable ingress and egress filtering on your routers and firewalls to block packets with illegitimate source IP addresses. Second, use secure authentication protocols, such as Kerberos or public-key cryptography, to validate the identity of communicating hosts. Third, apply network segmentation to limit the potential impact of an IP spoofing attack. Lastly, keep your network devices, firewalls, and intrusion detection systems updated with the latest security patches and signatures to protect against known vulnerabilities and emerging threats.

Related questions

Two networking devices that are used to connect hosts to the access layer?

A Hub or a Switch


Whitch two networking are used to connect hosts to the access layer?

switch,hub.


Hosts as related to Computer Networking?

Hosts, as related to computer networking are computers that have complete two-way access to other computers across the Internet.


What is the function and purpose of authentication services?

Authentication services are used to determine infusers are who they claim to be and are allowed to access what they are trying to access. The purpose of authentication is to protect devices, hosts, and services of a network. Authentication ensures the identity of the entity wanting access. Authentication is the process of determining if a user or identity is who they claim to be. The main goal of authentication is security, authentication is one of the first lines of defense in networking.


What is the difference between WAP and WLAN?

WAP is an abbreviation for Wireless Access Point, provided by an Integrated Services Router (ISR). Laptop computers and other various devices with wireless capabilities may be able to connect to the internet on this wireless connection. WLAN is an abbreviation for Wireless Local Area Network. Multiple wireless hosts are able to easily connect with one another when they are all on the same WLAN.


Different hosts connect to the same switch?

They can; that is the usual function of a switch.


What service is needed in order for the hosts to access the internet?

DHCPDHCP


Which type of network map shows the location of hosts network devices and media?

physical topology


What is the collection of hosts connected by networking device?

it is the collection of computer and devises connected togethere, and connected in the sane building or immediate area


What is the 5 4 3 rule in networking?

On a standard Ethernet network, between any two devices that communicate (such as computers), you can't have more than 4 repeaters (this includes hubs). "5-4-3" refers to a maximum of 5 segments; 4 repeaters; 3 segments with hosts on them.


What layer describes how hosts access the physical media?

Data Link Layer


For what hostsdevices would you still need static addresses?

for what hosts devices would you still need static addresses