Which of the following network devices restricts traffic based on words, signatures, and URLs?

A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer

Answer: B. Content filter

Computer Science & Information Technology

You might also like to view...

The ________ action provides a useful tool in a database as it can be utilized to provide feedback to the user that the macro did indeed run

A) MsgBox B) Message C) # MsgBox D) Message Box

Computer Science & Information Technology

An inconsistency in a database is referred to as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology