If you need to employ security by disallowing users from one department or network segment from access another department's resources, which should you use?
A. bridges
B. hubs
C. routers
D. switches
Answer: C
You might also like to view...
A copy constructor must receive its argument by reference because:
a. Otherwise the constructor will only make a copy of a pointer to an object. b. Otherwise infinite recursion occurs. c. The copy of the argument passed by value has function scope. d. The pointer needs to know the address of the original data, not a temporary copy of it.
Click the FILE tab, click Print, then click Print again to display the ____.
A. Table dialog box B. Report dialog box C. Print dialog box D. Save As dialog box
Which of the following is NOT an example of a statistical function?
A) COUNTIFS B) SUMIF C) AVERAGEIF D) AVERAGEIFS
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.
A. botherders B. botnets C. passes D. tokens