________ are used to screen data coming onto a LAN and, if the message is deemed safe, send it through to the intended receiver.
(a) Packet-filtering firewalls.
(b) Kerberos.
(c) Application level gateways.
(d) Biometrics.
(c) Application level gateways.
Computer Science & Information Technology
You might also like to view...
When the transform box is visible, it shows selection handles.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Write a statement that prints the 8th character of a String object called introduction.
What will be an ideal response?
Computer Science & Information Technology