What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
A. hub
B. switch
C. firewall
D. VPN
Answer: C
You might also like to view...
______ is an anonymous form of payment.
Fill in the blank(s) with the appropriate word(s).
Why can a colon NOT be used in a file name?
A) The colon is used exclusively for deleting folders and cannot be used in a file name. B) The colon is exclusively used to indicate a drive on the computer. An example is C: drive. C) The colon is strictly used for moving files from one folder to another. D) Colons are symbols that represent programs accessed on the start menu.
Microsoft PowerPoint and Apple Keynote are examples of ________
A) project management software B) document management systems C) presentation applications D) personal information managers
Email is becoming an outdated means of internal and external business communication.
Answer the following statement true (T) or false (F)