What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server?
A. IP renumbering
B. Supernetting
C. Address masquerading
D. Subnetting
Answer: C
Computer Science & Information Technology
You might also like to view...
_____ a fileplaces it in a new location but does not remove it from its current location.
A. ?Shifting B. ?Copying C. ?Transforming D. ?Altering
Computer Science & Information Technology
In Dreamweaver, use the ____________________ to add styles to figure and figcaption elements.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology