Which of the following is used to restrict access according to user policies?
A. Content filter
B. DHCP server
C. DNS server
D. VPN concentrator
Answer: A. Content filter
Computer Science & Information Technology
You might also like to view...
The layouts available for Navigation forms can be seen in the gallery
Indicate whether the statement is true or false
Computer Science & Information Technology
Answer the following statements true (T) or false (F)
1. The approach taken by Kerberos is using authentication software tied to a secure authentication server. 2. The overall scheme of Kerberos is that of a trusted third-party authentication service. 3. Kerberos is designed to counter only one specific threat to the security of a client/server dialogue. 4. An obvious security risk is that of impersonation. 5. The authentication server shares a unique secret key with each server.
Computer Science & Information Technology