Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?

A. firewall
B. bastion host
C. DMZ
D. boundary router


Answer: A

Computer Science & Information Technology

You might also like to view...

It is illegal for employers to monitor employee e-mail sent using the company e-mail system

Indicate whether the statement is true or false

Computer Science & Information Technology

How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?

A. One B. Two C. three D. four

Computer Science & Information Technology

In mathematical simulations, the steps of a program are used to model the behavior of a real system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Programming languages that use the substitution of word-like symbols, such as ADD, SUB, MUL, for the binary opcodes, and both decimal numbers and labels for memory addresses are referred to as ____.

A. machine languages B. assembly languages C. low-level languages D. interpreted languages

Computer Science & Information Technology