What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?

A. router
B. VPN server
C. ICMP monitor
D. proxy server


Answer: D

Computer Science & Information Technology

You might also like to view...

Which tool allows a user to connect to the active registry database and make changes that are effective immediately?

A. EDITREG.EXE B. REGEDIT.EXE C. REGISTER.EXE D. CHGREG.EXE

Computer Science & Information Technology

________ indexes place marked entries and subentries on separate lines with spacing before each indexed item

A) Indented B) Run-in C) Cross-referenced D) Table

Computer Science & Information Technology

In a query, the sort order, when sorting on multiple fields, is determined by the field order from left to right.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following preprocessor directives does not constitute part of the preprocessor wrapper?

a. #define b. #endif c. #ifndef d. #include

Computer Science & Information Technology