The dominant architecture used to secure network access today is the __________ firewall.

A. static
B. bastion
C. unlimited
D. screened subnet


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is not a String method:

a) IndexOf b) IndexOfAll c) IndexOfAny d) LastIndexOfAny

Computer Science & Information Technology

Which of the following is an example of a multifactor authentication?

A) A password and a PIN B) A cognitive password and a PIN C) A fingerprint scan and a retina scan D) A smartcard and a retina scan

Computer Science & Information Technology

To adjust the size of a printed worksheet to fit on the number of pages specified, using ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?

A. Router B. Hub C. WAP D. Switch

Computer Science & Information Technology