A(n) ____ is an ideal endpoint for VPN, which connects two companies' networks over the Internet.

A. DMZ
B. extranet
C. firewall
D. intranet


Answer: C

Computer Science & Information Technology

You might also like to view...

Message authentication is achieved using a __________ .

A. DES B. MDF C. SHA D. MAC

Computer Science & Information Technology

If the length of the array P is 4 and the length of the array T is 14, how many shifts of P need to be performed in the string searching algorithm?

a. 11 b. 9 c. 12 d. 10

Computer Science & Information Technology

A compiler is an example of application software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The first thing to do upon notification of a new software patch is to____.

A. identify the criticality of the patch B. deploy the patch C. test the patch D. run automatic updating

Computer Science & Information Technology