This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.

A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering


Answer: C

Computer Science & Information Technology

You might also like to view...

Give some examples of applications where the use of mobile code is beneficial.

What will be an ideal response?

Computer Science & Information Technology

Describe the properties of hashes that make them ideal for identifying a particular digital item.

What will be an ideal response?

Computer Science & Information Technology

Document statistics show the number of revisions made to a document

Indicate whether the statement is true or false

Computer Science & Information Technology

What are the three parts of a class definition in C#?

What will be an ideal response?

Computer Science & Information Technology