Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer
Answer: B. Content filter
Computer Science & Information Technology
You might also like to view...
The ________ action provides a useful tool in a database as it can be utilized to provide feedback to the user that the macro did indeed run
A) MsgBox B) Message C) # MsgBox D) Message Box
Computer Science & Information Technology
An inconsistency in a database is referred to as a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology