Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
A. Access control list
B. Load balancer
C. Content filter
D. Proxy server
Answer: B. Load balancer
Computer Science & Information Technology
You might also like to view...
Which of the following statement about macros is TRUE?
A) The maximum number of characters for a macro name is 80. B) A macro cannot be assigned to a button. C) A macro name can consist of spaces. D) A macro cannot be placed on the Quick Access Toolbar.
Computer Science & Information Technology
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.
A. MIC key B. EAPOL-KEK C. EAPOL-KCK D. TK
Computer Science & Information Technology