This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
Answer: C
Computer Science & Information Technology
You might also like to view...
Give some examples of applications where the use of mobile code is beneficial.
What will be an ideal response?
Computer Science & Information Technology
Describe the properties of hashes that make them ideal for identifying a particular digital item.
What will be an ideal response?
Computer Science & Information Technology
Document statistics show the number of revisions made to a document
Indicate whether the statement is true or false
Computer Science & Information Technology
What are the three parts of a class definition in C#?
What will be an ideal response?
Computer Science & Information Technology