A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A. gateway
B. proxy
C. switch
D. hub


Answer: A

Computer Science & Information Technology

You might also like to view...

____________________ audio is a recording of real music, vocals, sound effects, or speech that has been converted into electronic signals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements are correct?

``` I: File file = new File("input.txt"); try (Scanner input = new Scanner(file)) { String line = input.nextLine(); } II: try (File file = new File("input.txt"); Scanner input = new Scanner(file);) { String line = input.nextLine(); } III: File file; try (file = new File("input.txt"); Scanner input = new Scanner(file);) { String line = input.nextLine(); } IV: File file; Scanner input; try (file = new File("input.txt"); input = new Scanner(file);) { String line = input.nextLine(); }``` a. I b. II c. III d. IV

Computer Science & Information Technology

Diskette drives are only available on generation one virtual machines.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following access methods uses radio frequency waves for authentication?

A. Video surveillance B. Mantraps C. Proximity readers D. Biometrics

Computer Science & Information Technology