What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server?

A. IP renumbering
B. Supernetting
C. Address masquerading
D. Subnetting

Answer: C

Computer Science & Information Technology

You might also like to view...

_____ a fileplaces it in a new location but does not remove it from its current location.

A. ?Shifting B. ?Copying C. ?Transforming D. ?Altering

Computer Science & Information Technology

In Dreamweaver, use the ____________________ to add styles to figure and figcaption elements.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology