Which of the following network devices would a network administrator use to create a DMZ?
A. Host based Firewall
B. File server
C. Network based firewall
D. WINS server
Answer: C. Network based firewall
You might also like to view...
What are dummy and special targets? What are they used for? Give an example makefile that illustrates the use of both types of targets.
What will be an ideal response?
A(n) _________loop occurs when a condition in a while statement never becomes false.
a) indefinite b) undefined c) nested d) infinite
An incident is an event in which the integrity of a(n) __________ is compromised.
A. service level agreement (SLA) B. IT infrastructure C. forensic report D. vulnerability scan
Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.
A. bypass B. theft C. trespass D. security