Which of the following is used to restrict access according to user policies?

A. Content filter
B. DHCP server
C. DNS server
D. VPN concentrator

Answer: A. Content filter

Computer Science & Information Technology

You might also like to view...

The layouts available for Navigation forms can be seen in the gallery

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The approach taken by Kerberos is using authentication software tied to a secure authentication server. 2. The overall scheme of Kerberos is that of a trusted third-party authentication service. 3. Kerberos is designed to counter only one specific threat to the security of a client/server dialogue. 4. An obvious security risk is that of impersonation. 5. The authentication server shares a unique secret key with each server.

Computer Science & Information Technology