A(n) ____ is an ideal endpoint for VPN, which connects two companies' networks over the Internet.
A. DMZ
B. extranet
C. firewall
D. intranet
Answer: C
Computer Science & Information Technology
You might also like to view...
Message authentication is achieved using a __________ .
A. DES B. MDF C. SHA D. MAC
Computer Science & Information Technology
If the length of the array P is 4 and the length of the array T is 14, how many shifts of P need to be performed in the string searching algorithm?
a. 11 b. 9 c. 12 d. 10
Computer Science & Information Technology
A compiler is an example of application software.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The first thing to do upon notification of a new software patch is to____.
A. identify the criticality of the patch B. deploy the patch C. test the patch D. run automatic updating
Computer Science & Information Technology