Which of the following devices should you use to keep machines behind it anonymous? (Select the best answer.)
A. Caching proxy
B. IP proxy
C. Circuit-level gateway
D. Firewall
E. UTM
B. IP proxy secures a network by keeping the computers behind it anonymous. Caching proxies store HTTP or other information so that clients don't have to actually contact a remote server. Circuit-level gateways apply security mechanisms when connections are established; they are a type of filtering. Firewalls protects the LAN, and although some firewall devices include an IP proxy, they won't necessarily do so. Although a UTM (unified threat management) device might include an IP proxy, it won't necessarily have one, so the answer "IP proxy" specifically is the better answer.
You might also like to view...
System outputs are used as ________ to compare performance with goals.
A) feedback B) data C) inputs D) None of the above.
Which of the following is in order processing for a binary tree?
a) i) process the right subtree ii) process the root node data iii) process the left subtree b) i) process the left subtree ii) process the root node data iii) process the right subtree c) i) process the root node data ii) process the left subtree iii) process the right subtree d) i) process the left subtree ii) process the right subtree iii) process the root node e) i) process the right subtree ii) process the left subtree iii) process the root node
Which of the following are examples of system metadata?
a. FAT Tables b. The EXIF header c. Document metadata d. MAC data
In a flow chart, you would use a(n) ________ shape to indicate where a process is implemented in the chart
Fill in the blank(s) with correct word