You work in a company that accesses the Internet frequently. This makes the company's network vulnerable to attacks. You want to protect your company's network from external attacks. Which of the following will you use to accomplish the task?

A) Repeater

B) DHCP relay agent

C) Antivirus

D) Firewall


D) Firewall

Computer Science & Information Technology

You might also like to view...

When debugging, to execute the highlighted instruction, you can use either the Debug menu's Step Into option or the ____ key on your keyboard.

A. F2 B. F6 C. F8 D. F12

Computer Science & Information Technology

The commands in this tab of the Properties dialog box are used to change the appearance of the values on the PivotTable:

A) Properties. B) Formula. C) Format. D) Captions.

Computer Science & Information Technology

The ____ list style type uses Arabic numbers preceded by zeros.

A. zero B. Arabic-zero C. decimal D. decimal-leading-zero

Computer Science & Information Technology

The Third Amendment is the portion of the Bill of Rights that addresses a citizen's right to privacy

a. True b. False

Computer Science & Information Technology