If you need to employ security by disallowing users from one department or network segment from access another department's resources, which should you use?

A. bridges
B. hubs
C. routers
D. switches


Answer: C

Computer Science & Information Technology

You might also like to view...

A copy constructor must receive its argument by reference because:

a. Otherwise the constructor will only make a copy of a pointer to an object. b. Otherwise infinite recursion occurs. c. The copy of the argument passed by value has function scope. d. The pointer needs to know the address of the original data, not a temporary copy of it.

Computer Science & Information Technology

Click the FILE tab, click Print, then click Print again to display the ____.

A. Table dialog box B. Report dialog box C. Print dialog box D. Save As dialog box

Computer Science & Information Technology

Which of the following is NOT an example of a statistical function?

A) COUNTIFS B) SUMIF C) AVERAGEIF D) AVERAGEIFS

Computer Science & Information Technology

Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.

A. botherders B. botnets C. passes D. tokens

Computer Science & Information Technology