A ………………. is an extension of an enterprise’s private intranet across a public Network such as  the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP
B) VPN
C) VSN
D) VSPN

1 Answer

Answer :

B) VPN

Related questions

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these

Last Answer : b) Extensible Business Reporting Language

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : What is Virtual Private Network (VPN) ?

Last Answer : Answer : VPN provides a secure connection for the user when the user is connected to the company's network server using the Internet.

Description : VPN stands for: a) Virtual Perfect Network b) Virtual Power Network c) Virtual Private Network d) None of These

Last Answer : c) Virtual Private Network

Description : 3 Long Form of the VPN A)Virtual Private Network B)Virtual Personal Network C)Both D)None

Last Answer : A)Virtual Private Network

Description : Long Form of the VPN A)Virtual Private Network B)Virtual Personal Network C)Both D)None

Last Answer : A)Virtual Private Network

Description : 'Golden Handshake Scheme' is associated with - (1) inviting foreign companies (2) private investment in public enterprises (3) establishing joint enterprises (4) voluntary retirement

Last Answer : (4) voluntary retirement Explanation: The voluntary retirement scheme (VRS) is the most humane technique to provide overall reduction in the existing strength of the employees. It is a technique used by companies ... . It is also known as 'Golden Handshake' as it is the golden route to retrenchment.

Description : Golden Handshake Scheme is associated with - (1) Inviting foreign companies (2) Private investment in public enterprises (3) Establishing joint enterprises (4) Voluntary retirement

Last Answer : (4) Voluntary retirement Explanation: A golden handshake is a clause in an executive employment contract that provides the executive with a significant severance package in the case that the executive ... , and other benefits, and is often accompanied by an accelerated vesting of stock options.

Description : In an economy, the sectors are classified into public and private on the basis of - (1) employment conditions (2) nature of economic activities (3) ownership of enterprises (4) use of raw materials

Last Answer : (3) ownership of enterprises Explanation: The classical breakdown of all economic sectors is: primary, secondary and tertiary. However, on the basis of ownership, the sectors are: business sector, private sector (privately run businesses), public sector (state sector) and voluntary sector.

Description : Departmental undertakings, statutory corporations and government companies comes under the category of a. Public Private Partnership b. Private Sector Enterprises b. Incorporated Enterprises d. Public or State Enterprises

Last Answer : d. Public or State Enterprises

Description : In an economy, the sectors are classified into public and private on the basis of (1) employment conditions (2) nature of economic activities (3) ownership of enterprises (4) use of raw materials

Last Answer :  ownership of enterprises 

Description : ‘Golden Handshake Scheme’ is associated with (1) inviting foreign companies (2) private investment in public enterprises (3) establishing joint enterprises (4) voluntary retirement

Last Answer : voluntary retirement

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : S/MIME in Internet technology stands for (A) Secure Multipurpose Internet Mail Extension (B) Secure Multimedia Internet Mail Extension (C) Simple Multipurpose Internet Mail Extension (D) Simple Multimedia Internet Mail Extension

Last Answer : (A) Secure Multipurpose Internet Mail Extension

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet

Last Answer : c. can be done on internet 

Description : How secure is a wireless network router, will my neighbors be able to use my connection?

Last Answer : Wireless networking can be very tightly secured, but with default settings the connection is easily stolen by neighbors with the appropriate knowledge.

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : D) False, False

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : How can we make government constantly increase its efficiency like private enterprises do?

Last Answer : Easy: Make it more like private enterprise.

Description : In Java, when we implement an interface method, it must be declared as: (A) Private (B) Protected (C) Public (D) Friend

Last Answer : (C) Public

Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public

Last Answer : (A) inaccessible

Description : How do I secure my internet connection?

Last Answer : Do you have a wireless router? If you don’t they can’t do it by piggybacking. Or Wardriving.

Description : How can I secure my home internet connection?

Last Answer : it's actually not difficult in either case. you're referring to a wireless network, correct? and when you write log on what exactly do you mean? i don't know any people that have to log on ... their machine is configured. i use comcast as well and it's great. what model router are you using?

Description : How do I secure my internet connection?

Last Answer : answer:The security of your connection to the internet is a two way street: your computer is happy to encrypt the data you send over the internet, but the server receiving the data needs to be happy to ... will only let certain devices (which you have to specify) connect to it. Hope that helps :-]

Description : Which of the following is true of cloud computing? A. It's always going to be less expensive and more secure than local computing. B. You can access your data from any computer in the world, ... connection. C. Only a few small companies are investing in the technology, making it a risky venture.

Last Answer : You can access your data from any computer in the world, as long as you have an Internet connection.

Description : A ………….. is a temporary connection that uses the Public Switched Telephone Network (PSTN) to connect to the Internet. -Technology

Last Answer : dial-up connection

Description : The characteristics of well designed system are a) Practical b) Effective c) Secure d) Reliable e) Flexible f) Economical A) a, b, c and d B) a, c, d and e C) a, b, c, d and e D) a, b, c, d, e and f

Last Answer : D) a, b, c, d, e and f

Description : How can I secure an extension cord into its outlet?

Last Answer : Tie the cord in a knot around the foot of the bed closest to the outlet, leaving yourself enough cord to plug it in. Then, if you accidentally kick the cord, you’re pulling on the knot, not the plug in the outlet. I do this with the cord on my electric leaf blower around a post in my garage.

Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say

Last Answer : a) A network within a single company

Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c

Last Answer : A. Network

Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking

Last Answer : b. Network

Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true

Last Answer : D) i, ii & iv are true

Description : C++ is an extension of C with a major addition of the class construct feature of …………….. A) Simula67 B) Simula57 C) Simula47 D) Simula87

Last Answer : A) Simula67

Description : Cohesion is an extension of: (A) Abstraction concept (B) Refinement concept (C) Information hiding concept (D) Modularity

Last Answer : (C) Information hiding concept 

Description : ...............tag is an extension to HTML that can enclose any number of Javascript statements. (A)< SCRIPT> (B)< BODY> (C)< HEAD> (D)

Last Answer : Answer: A

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4

Last Answer : B) a-3, b-1, c-4, d-2

Description : Java servlets are an efficient and powerful solution for creating ………….. for the web. A) Dynamic content B) Static content C) Hardware D) Both a and b

Last Answer : A) Dynamic content

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : How do I set up a VPN network and connect it to my iPod Touch 1st gen?

Last Answer : please answer!