________ are used to screen data coming onto a LAN and, if the message is deemed safe, send it through to the intended receiver.

(a) Packet-filtering firewalls.
(b) Kerberos.
(c) Application level gateways.
(d) Biometrics.


(c) Application level gateways.

Computer Science & Information Technology

You might also like to view...

____________________ scanning is TCP connection scanning, but it does not complete the connections.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a button that allows you to customize a chart?

A.
B.
C.
D.

Computer Science & Information Technology

Which of the following describes the result of using the Where option in a query?

A) It displays the total number of fields selected by the query B) It does not display the total number of fields selected by the query C) It does not display the selected field in the record set of the query D) It displays the selected field in the record set of the query

Computer Science & Information Technology

________ spacing is the distance between lines of text in a paragraph

Fill in the blank(s) with correct word

Computer Science & Information Technology