X hits on this document

Powerpoint document

Security+ Guide to Network Security Fundamentals, Third Edition - page 30 / 60

203 views

0 shares

0 downloads

0 comments

30 / 60

Security+ Guide to Network Security Fundamentals, Third Edition

Networks

Redundant network

“Waits” in the background during normal operations

Uses a replication scheme to keep its copy of the live network information current

Virtually all network components can be duplicated to provide a redundant network

In addition, some organizations contract with more than one Internet Service Provider (ISP) for remote connectivity

Document info
Document views203
Page views203
Page last viewedWed Jan 18 05:56:10 UTC 2017
Pages60
Paragraphs499
Words2429

Comments