Which of the following can be used to hide the company internal IP address?
a. Packet filter
b. Firewall
c. Proxy server
d. Bastion host
ANS: C
Computer Science & Information Technology
You might also like to view...
The _________ layer deals with the logical structure of files and with the operations that can be specified by users, such as open, close, read, and write.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
E-mails are completely private
Indicate whether the statement is true or false
Computer Science & Information Technology
A bullet character is an example of a symbol
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the process called that canceled out the magnetic interference with speakers and other devices?
A) Shielding B) Buffering C) Insulating D) RMS
Computer Science & Information Technology