Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

A. firewall
B. DMZ
C. honeypot
D. IDS


Answer: B

Computer Science & Information Technology

You might also like to view...

The rules that govern how code should be entered are called  ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the distinction between the virtualization approach advocated by Xen and the style of microkernel advocated by the Exokernel project? In your answer, highlight two things they have in common and two distinguishing characteristics between the approaches.

What will be an ideal response?

Computer Science & Information Technology

The term ____ refers to the number of records processed in a given time period.

A. throughput B. data set C. data validation D. sentinel

Computer Science & Information Technology

The file where an object is embedded or linked

a. Read-only file b. Destination file c. Source file

Computer Science & Information Technology