Which of these is a common characteristic of an impact printer?
An open network jack in a conference room can provide a malicious user with complete access to the internal network. In this video, you’ll learn how network access control (NAC) can be used to help secure network connections.
VoIP and telephony technologies are now integrated into almost all of our networks. In this video, you’ll learn what security concerns exist for telephony-related technologies.
Nearly every Internet-connected organization uses some type of network address translation. In this video, you’ll learn how destination NAT and source NAT is used to provide Internet connectivity and to protect your internal servers from users on the Internet.
Nearly every network requires the administration of virtual LANs, or VLANs. In this video, you’ll learn about VLANs and how they can be used to logically segment and secure your network.
One of the key concepts of TCP/IP networks is subnetting. In this video, you’ll learn why we subnet our networks and you’ll see a network design that incorporates separate IP subnets.
A common network design is to include a virtual DMZ (demilitarized zone) to separate the Internet from the inside of the network. In this video, you’ll learn how a DMZ is used as a layer of protection and which devices you would commonly find in a DMZ.