Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?

A. Access control list
B. Load balancer
C. Content filter
D. Proxy server

Answer: B. Load balancer

Computer Science & Information Technology

You might also like to view...

Which of the following statement about macros is TRUE?

A) The maximum number of characters for a macro name is 80. B) A macro cannot be assigned to a button. C) A macro name can consist of spaces. D) A macro cannot be placed on the Quick Access Toolbar.

Computer Science & Information Technology

The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.

A. MIC key B. EAPOL-KEK C. EAPOL-KCK D. TK

Computer Science & Information Technology