A ________ is hardware or software that protects a wired network from intruders
A) relay
B) firewall
C) switch
D) gateway
B
Computer Science & Information Technology
You might also like to view...
The Hyperlink data type is assigned to fields that contain links to Web pages and email addresses that open when clicked. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Name the two sections of a class:
What will be an ideal response?
Computer Science & Information Technology
An attacker tries to guess a user’s password using which of the following techniques?
a. Password sniffing b. Password cracking c. Password sampling d. Password interrogation
Computer Science & Information Technology
The ____ vertex operation returns the data stored in a vertex.
A. get B. retrieve C. obtain D. peek
Computer Science & Information Technology