Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?
A. firewall
B. bastion host
C. DMZ
D. boundary router
Answer: A
You might also like to view...
It is illegal for employers to monitor employee e-mail sent using the company e-mail system
Indicate whether the statement is true or false
How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?
A. One B. Two C. three D. four
In mathematical simulations, the steps of a program are used to model the behavior of a real system.
Answer the following statement true (T) or false (F)
Programming languages that use the substitution of word-like symbols, such as ADD, SUB, MUL, for the binary opcodes, and both decimal numbers and labels for memory addresses are referred to as ____.
A. machine languages B. assembly languages C. low-level languages D. interpreted languages