32. Along with an IP address, a subnet mask, and a name server, which of the following is the other thing required for a computer to operate on a network?
35. VPNs often use an authentication procedure that requires a user to generate a short lived numerical token through a specialized piece of hardware or software, in addition to providing a username and password. What is this authentication procedure called?
36. Fill in the blank: A service that appears to external clients as a single server, but actually represents many servers behind it, is known as a _____.