What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
A. router
B. VPN server
C. ICMP monitor
D. proxy server
Answer: D
Computer Science & Information Technology
You might also like to view...
What is the category for information that deserves the most protection and if it were disclosed the results could be catastrophic?
a. Secret b. Top secret c. Private d. Confidential
Computer Science & Information Technology
Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
A. The scan job is scheduled to run during off-peak hours. B. The scan output lists SQL injection attack vectors. C. The scan data identifies the use of privileged-user credentials. D. The scan results identify the hostname and IP address.
Computer Science & Information Technology