Networks – Internet vs. intranet distinction Which statement best captures the core difference between the Internet and an intranet in terms of scope and accessibility?

Difficulty: Easy

Correct Answer: One is public, the other is private

Explanation:


Introduction / Context:
Organizations often deploy private networks that look and feel like the web (browsers, web apps, internal portals) but are accessible only to authorized users. Distinguishing an intranet from the public Internet is foundational for IT policy, security, and architecture.


Given Data / Assumptions:

  • The Internet is a global, publicly reachable network of networks using TCP/IP.
  • An intranet is a private TCP/IP-based network operated by an organization.
  • Security posture can vary; privacy versus public accessibility is the primary distinction.


Concept / Approach:
The essential difference is scope and access. The Internet is globally addressable and open (with local restrictions), while an intranet is private, typically behind firewalls, VPNs, and access controls. Both can use the same technologies (HTTP/HTTPS, DNS, email) and both can be monitored; security and safety depend on configuration, not on the label Internet/intranet per se.


Step-by-Step Solution:
Identify the axis that always distinguishes them: public vs. private reachability.Eliminate claims about inherent safety or inability to monitor—those are not universally true.Select “One is public, the other is private.”


Verification / Alternative check:
Corporate IT documentation often defines intranet resources as internal-only and reachable via internal DNS or VPN, whereas Internet resources are globally reachable via public DNS and AS-level routing.


Why Other Options Are Wrong:

  • One is safer than the other: depends on controls; not an inherent property.
  • One can be monitored, the other can’t: both can be monitored.
  • None of the above: incorrect because public vs. private is correct.


Common Pitfalls:
Assuming intranets are automatically secure. They still require authentication, patching, and segmentation.


Final Answer:
One is public, the other is private

More Questions from Technology

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion