What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
A. router
B. VPN server
C. ICMP monitor
D. proxy server
Answer: D
Computer Science & Information Technology
You might also like to view...
Which tool allows a user to connect to the active registry database and make changes that are effective immediately?
A. EDITREG.EXE B. REGEDIT.EXE C. REGISTER.EXE D. CHGREG.EXE
Computer Science & Information Technology
________ indexes place marked entries and subentries on separate lines with spacing before each indexed item
A) Indented B) Run-in C) Cross-referenced D) Table
Computer Science & Information Technology
In a query, the sort order, when sorting on multiple fields, is determined by the field order from left to right.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following preprocessor directives does not constitute part of the preprocessor wrapper?
a. #define b. #endif c. #ifndef d. #include
Computer Science & Information Technology