Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the internal network to outsiders?
A. loopback
B. proxy server
C. subnet mask
D. layer-3 switch
Answer: B
Computer Science & Information Technology
You might also like to view...
What is the name of a "master" asset that drives all instantiated (copies of) GameObjects derived from it?
What will be an ideal response?
Computer Science & Information Technology
The metacharacter (^) anchors characters to the end of a string.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
A. interface capture B. port identity C. port snooping D. port mirroring
Computer Science & Information Technology
A module definition consists of the module header and the module __________.
a. body b. statements c. call d. arguments
Computer Science & Information Technology