A ________ is hardware or software that protects a wired network from intruders

A) relay
B) firewall
C) switch
D) gateway


B

Computer Science & Information Technology

You might also like to view...

The Hyperlink data type is assigned to fields that contain links to Web pages and email addresses that open when clicked. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Name the two sections of a class:

What will be an ideal response?

Computer Science & Information Technology

An attacker tries to guess a user’s password using which of the following techniques?

a. Password sniffing b. Password cracking c. Password sampling d. Password interrogation

Computer Science & Information Technology

The ____ vertex operation returns the data stored in a vertex.

A. get B. retrieve C. obtain D. peek

Computer Science & Information Technology