A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?

A. Content filter
B. Firewall
C. DNS
D. DHCP

Answer: B. Firewall

Computer Science & Information Technology

You might also like to view...

Which of the following are ways to help defend against distributed denial-of-service attacks? (Select the three best answers)

A. Update firewalls. B. Carefully select applications. C. Use intrusion prevention systems. D. Use a "clean pipe."

Computer Science & Information Technology

The following pseudocode

``` IF AVG > 93 THEN GRADE = “A” ELSE IF AVG > 83 THEN GRADE = “B” ELSE GRADE = “P” ENDIF ENDIF ``` represents a a) sequential IFTHENELSE pattern b) nested IFTHENELSE pattern c) null IFTHENELSE pattern d) simple IFTHENELSE pattern

Computer Science & Information Technology