________ are used to screen data coming onto a LAN and, if the message is deemed safe, send it through to the intended receiver.

(a) Packet-filtering firewalls.
(b) Kerberos.
(c) Application level gateways.
(d) Biometrics.

(c) Application level gateways.

Computer Science & Information Technology

You might also like to view...

When the transform box is visible, it shows selection handles.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Write a statement that prints the 8th character of a String object called introduction.

What will be an ideal response?

Computer Science & Information Technology