Which of the following network devices filters traffic of many different protocols based on a predetermined set of rules established by a system administrator?
A. Proxy
B. Switch
C. Firewall
D. Router
Answer: C. Firewall
Computer Science & Information Technology
You might also like to view...
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
What will be an ideal response?
Computer Science & Information Technology
Describe the two types of recovery objectives you should build for each production database under different risk scenarios.
What will be an ideal response?
Computer Science & Information Technology
How are virtual machine assignments made available for users to discover?
A. a record is added to DNS B. they are recorded in Active Directory C. the NetBIOS name is broadcast D. RD virtualization host announcements
Computer Science & Information Technology
A(n) ________ data macro can be attached to an event in a form.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology