A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?
A. VPN
B. Throughput tester
C. Firewall
D. OC3
Answer: C. Firewall
Computer Science & Information Technology
You might also like to view...
The ________ keyboard shortcut duplicates a selection from the original location and places it in the Clipboard
Fill in the blank(s) with correct word
Computer Science & Information Technology
At the top level of the group key hierarchy is the ___________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology