Which of the following network devices would a network administrator use to create a DMZ?

A. Host based Firewall
B. File server
C. Network based firewall
D. WINS server


Answer: C. Network based firewall

Computer Science & Information Technology

You might also like to view...

What are dummy and special targets? What are they used for? Give an example makefile that illustrates the use of both types of targets.

What will be an ideal response?

Computer Science & Information Technology

A(n) _________loop occurs when a condition in a while statement never becomes false.

a) indefinite b) undefined c) nested d) infinite

Computer Science & Information Technology

An incident is an event in which the integrity of a(n) __________ is compromised.

A. service level agreement (SLA) B. IT infrastructure C. forensic report D. vulnerability scan

Computer Science & Information Technology

Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.

A. bypass B. theft C. trespass D. security

Computer Science & Information Technology