____ used for protecting a network may be created using routers.

A. Switches
B. Firewalls
C. Terminators
D. Hubs


Answer: B

Computer Science & Information Technology

You might also like to view...

Conventions are valuable because:

a. They’re a shorthand that enables users to understand what’s going on at a glance. b. They’ve been adopted as conventions because they’ve proven effective. c. They save you the time and trouble of inventing things from scratch. d. All of the above.

Computer Science & Information Technology

To delete a building block, you need to use the ________ dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

In which discipline do professionals listen to voice recordings to determine who’s speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter in question?

a. Communication forensics b. Forensic linguistics c. Linguistic analysis d. Communication linguistics

Computer Science & Information Technology

A(n) ____________________ is the state of the backup when the data is recovered-in essence, how much data will be lost if a backup is used.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology