Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?
A. firewall
B. DMZ
C. honeypot
D. IDS
Answer: B
Computer Science & Information Technology
You might also like to view...
The rules that govern how code should be entered are called ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is the distinction between the virtualization approach advocated by Xen and the style of microkernel advocated by the Exokernel project? In your answer, highlight two things they have in common and two distinguishing characteristics between the approaches.
What will be an ideal response?
Computer Science & Information Technology
The term ____ refers to the number of records processed in a given time period.
A. throughput B. data set C. data validation D. sentinel
Computer Science & Information Technology
The file where an object is embedded or linked
a. Read-only file b. Destination file c. Source file
Computer Science & Information Technology