Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the internal network to outsiders?

A. loopback
B. proxy server
C. subnet mask
D. layer-3 switch


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the name of a "master" asset that drives all instantiated (copies of) GameObjects derived from it?

What will be an ideal response?

Computer Science & Information Technology

The metacharacter (^) anchors characters to the end of a string.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?

A. interface capture B. port identity C. port snooping D. port mirroring

Computer Science & Information Technology

A module definition consists of the module header and the module __________.

a. body b. statements c. call d. arguments

Computer Science & Information Technology