A program that blocks unwanted or unsafe data is called a ________

A) proxy B) username C) LOPSA D) firewall


D

Computer Science & Information Technology

You might also like to view...

There are four basic types of password attacks

Indicate whether the statement is true or false.

Computer Science & Information Technology

If your domain includes Windows Server 2003 or older DCs, it's using DFSR to replicate SYSVOL.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

This keeps your servers running for a short period of time after an electrical brownout or blackout.

A. UPS B. backup generator C. RAID D. redundant hardware

Computer Science & Information Technology

A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology