____ are designed to protect a device's network ports, or endpoints of communication.

A. Firewalls
B. Switches
C. Hubs
D. Repeaters


Answer: A

Computer Science & Information Technology

You might also like to view...

When a data set is small and a hash table not used, what is the better data structure to use?

a. Array b. Queue c. Linked list d. Stack

Computer Science & Information Technology

An SFA information system is used in product development.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The information security function can be placed within the __________.

A. insurance and risk management function B. administrative services function C. legal department D. All of the above

Computer Science & Information Technology

In the decimal system, ________ different digits are used to represent numbers with a base of 10.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology