Which of the following is used to filter incoming and outgoing traffic?

a. IDS
b. IPS
c. Firewall
d. DMZ

ANS: C

Computer Science & Information Technology

You might also like to view...

What are Specter Pro, FakeGINA, and Eblaster examples of?

a. Wrapper tools b. Keyloggers c. Backdoors d. Port redirection tools

Computer Science & Information Technology

After the conclusion of any criminal trial, if it becomes evident that an appeal is not possible, all contraband must be destroyed

a. True b. False

Computer Science & Information Technology