Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?

A. Ports
B. Demilitarized zones
C. Honeypots
D. Firewalls


Answer: D

Computer Science & Information Technology

You might also like to view...

The digital forensics competency encompasses all of the knowledge and skills required to obtain, authenticate, and investigate electronic data from all relevant ____.

A. risks B. incidents C. vulnerabilities D. assets

Computer Science & Information Technology

An example of a finite field is the set Zp consisting of all the integers {0, 1, . . . , p - 1}, where p is a __________ and in which arithmetic is carried out modulo p.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Discuss the considerations to keep in mind as you name symbols on the Library panel.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

Computer Science & Information Technology