Multiple Choice
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.
A) bastion
B) choke
C) DMZ
D) reduction point
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Discuss the two advantages that NAT provides.
Q9: Describe the difference between subnetting and VLANs.
Q21: Describe how VLAN communication takes place.
Q32: Networks are usually segmented by using _
Q34: _ switches are connected directly to the
Q36: NAT replaces a private IP address with
Q37: A(n) _ encrypts all data that is
Q39: Describe the difference between an active NIDS
Q41: A(n) _ does not serve clients, but
Q42: A _ is a network device that