Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?

A. Telnet
B. NAT
C. VPN
D. DMZ

Answer: B

Computer Science & Information Technology

You might also like to view...

Multiuser computers are more secure and allow access to centralized resources

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of column displays data calculated by a PL/SQL function?

a) calculated b) formula c) summary d) function

Computer Science & Information Technology