Which of the following would be used to place extranet servers in a separate subnet for security purposes?

A. VPN
B. NAT
C. DMZ
D. IDS


Answer: C. DMZ

Computer Science & Information Technology

You might also like to view...

What is a leaf node?

a. The last node in a binary search tree that doesn't have any child b. It's a root node c. It's a node added first to a binary tree d. It's the node added last to a binary tree

Computer Science & Information Technology

________ is a technique that can improve working set page replacement by removing pages from memory a process is no longer using.

a) Anticipatory page replacement b) Voluntary page release c) Asynchronous page flushing d) none of the above

Computer Science & Information Technology

Most formatting commands are located in the ________ group on the Home tab

A) Editing B) Styles C) Font D) Paragraph

Computer Science & Information Technology

A style that contains formatting characteristics that are applied only to text, such as font size and font color is a ________ style

A) character B) linked C) paragraph D) text

Computer Science & Information Technology