A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.

a. application level firewall
b. bullion server
c. ANI system
d. IP spoofing systems
e. packet level firewall


Ans: a. application level firewall

Computer Science & Information Technology

You might also like to view...

A style designed to create output for printed copy is called ____ style.

A. output B. copy C. print D. none of the above

Computer Science & Information Technology

Which of the following is NOT a formatting property available for many report controls?

A. Text Align B. Width C. Format D. Data Type

Computer Science & Information Technology

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

A. 96 bits B. 128 bits C. 160 bits D. 192 bits

Computer Science & Information Technology

Which of the following is not a broadband Internet connection option?

A. Cable B. Dial-up C. DSL D. Fiber-optic

Computer Science & Information Technology