The barrier between an internal and external network is called:

A) a firewall.
B) physical security.
C) encryption software.
D) behavioral security.
E) netlock.


A) a firewall.

Computer Science & Information Technology

You might also like to view...

Match the following forensic tools with their attributes

I. MacQuisition Boot CD A. Investigates the contents of BlackBerry devices II. HeaderBuilder B. Graphical user interface consists of a series of panes III. EnCase software C. Safely and easily images Mac drives IV. PDA Seizure D. Reads the first 32 bits of a file to identify its type V. Sleuth Kit E. Open-source program that runs on UNIX platforms

Computer Science & Information Technology

Intrusion detection systems can recognize signs of a network attack and disable access before an intruder can do damage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ____ table contains only text, evenly spaced on the Web page in rows and columns.

A. columnar text B. row-based C. preformatted text D. graphical

Computer Science & Information Technology

Which of the following statements does not alter the value stored in a memory location?

a. int a; b. number = 12; c. y = y + 2; d. width = Integer.parseInt(input);

Computer Science & Information Technology