What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A. hub
B. switch
C. firewall
D. VPN


Answer: C

Computer Science & Information Technology

You might also like to view...

______ is an anonymous form of payment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why can a colon NOT be used in a file name?

A) The colon is used exclusively for deleting folders and cannot be used in a file name. B) The colon is exclusively used to indicate a drive on the computer. An example is C: drive. C) The colon is strictly used for moving files from one folder to another. D) Colons are symbols that represent programs accessed on the start menu.

Computer Science & Information Technology

Microsoft PowerPoint and Apple Keynote are examples of ________

A) project management software B) document management systems C) presentation applications D) personal information managers

Computer Science & Information Technology

Email is becoming an outdated means of internal and external business communication. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology