Which of the following is used to filter incoming and outgoing traffic?
a. IDS
b. IPS
c. Firewall
d. DMZ
ANS: C
Computer Science & Information Technology
You might also like to view...
What are Specter Pro, FakeGINA, and Eblaster examples of?
a. Wrapper tools b. Keyloggers c. Backdoors d. Port redirection tools
Computer Science & Information Technology
After the conclusion of any criminal trial, if it becomes evident that an appeal is not possible, all contraband must be destroyed
a. True b. False
Computer Science & Information Technology