A(n) ________ examines and blocks Internet traffic in order to protect your private network.

A. VPN
B. encryption utility
C. firewall
D. antivirus


Answer: C

Computer Science & Information Technology

You might also like to view...

Access automatically saves each record when you move to the next row; you do not need to click Save

Indicate whether the statement is true or false

Computer Science & Information Technology

HTTP, .edu, and www are all examples of top-level domain names

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of inheritance does Java support?

A. single inheritance B. double inheritance C. multiple inheritance D. Java does not support inheritance.

Computer Science & Information Technology

Which of the following statements about binary files is false?

A. Data are stored in the internal format of the computer. B. Character data cannot be written to a binary file. C. Binary files are read using binary streams known as block input functions. D. Binary files are written using binary streams known as block output functions. E. Data do not need to be reformatted as they are read and written.

Computer Science & Information Technology