Which of the following allows an administrator to specify what applications are allowed access?

A) Packet filtering
B) Router
C) Stateful inspection
D) Application gateway


D) Application gateway

Computer Science & Information Technology

You might also like to view...

Which of the following is not a feature of OSPF?

a. Dynamic routing protocol b. Link state protocol c. Proprietary d. Supported by many vendors

Computer Science & Information Technology

Which of the following is a network that moves a product from the supplier to the customer and is comprised of vendors that supply raw material, manufacturers who convert the material into products, warehouses that store products, distribution centers that deliver them to the retailers, and retailers who bring the product to the consumer?

A. supply chain B. supply chain assessment C. supply sphere D. supply network

Computer Science & Information Technology

Which of the following can Matt, an administrator, use to ensure the confidentiality of a file when it is being sent over FTP?

A. WPA2 B. PGP C. MD5 D. NTLMv2

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. All problems can be solved by writing a set of step by step instructions for a computer 2. The more alternative solutions that are identified, the better chance you have of a good solution. 3. Any solution should be considered when solving a problem. 4. You can find a step-by-step solution for any problem as long as you understand the problem. 5. Problems that require a heuristic solution cannot be solved through a set of step by step instructions.

Computer Science & Information Technology