A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.

A. back doors
B. application proxies
C. perimeters
D. content locks


Answer: A

Computer Science & Information Technology

You might also like to view...

After you add a brush to the Brushes panel, you can ____.

A. save the artwork as a bitmap for later use B. close the document C. delete the artwork from the artboard D. save the artwork in the pasteboard area

Computer Science & Information Technology

When a style is set to update automatically, you can modify the style by formatting the text directly

Indicate whether the statement is true or false

Computer Science & Information Technology

Case OL 2-2Olivia's boss has asked her to set up a meeting for 10 people in the Yosemite Conference Room using Outlook Calendar.In this instance, the Yosemite Conference room is a(n) ____ for the meeting.

A. Resource B. Attendee C. Host D. Guest

Computer Science & Information Technology

What is the triangle marking in one corner of a CPU or APU used for?

a. Directs installer to the position of the CPU fan connection b. Indicates airflow requirements for fan c. Indicates location of heatsink d. Helps assure CPU or APU is properly aligned in socket

Computer Science & Information Technology