X hits on this document

Powerpoint document

Security+ Guide to Network Security Fundamentals, Third Edition - page 30 / 60

176 views

0 shares

0 downloads

0 comments

30 / 60

Security+ Guide to Network Security Fundamentals, Third Edition

Networks

Redundant network

“Waits” in the background during normal operations

Uses a replication scheme to keep its copy of the live network information current

Virtually all network components can be duplicated to provide a redundant network

In addition, some organizations contract with more than one Internet Service Provider (ISP) for remote connectivity

Document info
Document views176
Page views176
Page last viewedFri Dec 09 04:11:30 UTC 2016
Pages60
Paragraphs499
Words2429

Comments