Match each item with a statement below.

A. Function as an outbound network-level proxy.
B. Machine that has no unnecessary services, only the bare essentials.
C. Providing network services to users while shielding individual host computers.
D. Segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public.
E. Consists of general information about the size of the packet, the protocol that was used to send it, and the IP address of both the source computer and the destination
F. Boundary between two zones of trust.
G. Information you view and use.
H. Network subaddress through which a particular type of data is allowed to pass.
I. Determining whether to allow or deny the passage of packets of digital information, based on established security policy rules.


A. PAT and NAT
B. bastion host
C. application proxy
D. extranet
E. header
F. perimeter
G. data
H. port
I. packet filtering

Computer Science & Information Technology

You might also like to view...

A source that is effectively random is referred to as __________ .

A. an open source B. an entropy source C. a keystream D. a seed

Computer Science & Information Technology

In which stage of the employee life cycle does the employee settle into the job, integrate with the corporate culture, and establish his or her role within the organization?

A) Onboarding B) Career development C) User provisioning D) Orientation

Computer Science & Information Technology

A(n) ________ contains an additional row in the query design grid and displays aggregate data when the query is run

Fill in the blank(s) with correct word

Computer Science & Information Technology

A macro procedure begins with the word:

A) Sub. B) Macro. C) Func. D) Begin.

Computer Science & Information Technology