Select the most appropriate network technique to describe an active/passive server cluster in which only one server is active and dealing with requests.
Choose the authentication protocol from following to negotiate access to the network by use of certificates?
Which network monitoring utility will be used by a network administrator to make sure that there are no major collisions occurring on the network?