Match each item with a statement below.

A. Computer that has two separate network interfaces, one to the external Internet and one to the internal LAN.
B. Scan specific parts of the data portion of an HTTP packet and redirect it to a specific location.
C. Also called explicit proxies.
D. Maintain records of events such as logon attempts and accesses to files.
E. Defined pieces of packet or system data
F. Set of protocols that enable proxy server access to applications without an assigned proxy server.
G. A very popular proxy server for home and small business environments.
H. Evaluate the application-layer data buried in the data portion of an IP packet to determine whether to allow the packet to pass into or out of the network.
I. Configured so that they are totally invisible to end users.


A. dual-homed host
B. URL redirection
C. nontransparent proxies
D. log files
E. parameters
F. SOCKS
G. WinGate
H. proxy servers
I. transparent proxies

Computer Science & Information Technology

You might also like to view...

Context is a critical first step in ____.

A. scoping B. implementing C. designing D. tailoring

Computer Science & Information Technology

Which of the following classes is deepest in the inheritance hierarchy?

a. basic_iostream b. basic_ofstream c. basic_ifstream d. basic_fstream

Computer Science & Information Technology

A(n) ___________ is a special type of method that is used only when an object is created to initialize an object’s data.

a) initializer b) builder c) constructor d) definer

Computer Science & Information Technology

Another name for diagnostic software tools is ____.

A. utility software B. remote control software C. network monitor software D. registry editor

Computer Science & Information Technology