A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?

A. VPN
B. Throughput tester
C. Firewall
D. OC3

Answer: C. Firewall

Computer Science & Information Technology

You might also like to view...

The ________ keyboard shortcut duplicates a selection from the original location and places it in the Clipboard

Fill in the blank(s) with correct word

Computer Science & Information Technology

At the top level of the group key hierarchy is the ___________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology