Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?
A. Telnet
B. NAT
C. VPN
D. DMZ
Answer: B
Computer Science & Information Technology
You might also like to view...
Multiuser computers are more secure and allow access to centralized resources
Indicate whether the statement is true or false
Computer Science & Information Technology
What type of column displays data calculated by a PL/SQL function?
a) calculated b) formula c) summary d) function
Computer Science & Information Technology