These are the basic form of firewall protection.

What will be an ideal response?

access control lists

Computer Science & Information Technology

You might also like to view...

A web application accesses information in a database to retrieve user information. What is the web application acting as?

A. A subject B. An object C. A user D. A token

Computer Science & Information Technology

What do you need to have on your network so that users can use user-friendly names to locate network computers?

A. DHCP B. DNS C. AD DS D. NAT

Computer Science & Information Technology