Multiple Choice
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
A) high availability computing
B) deep-packet inspection
C) application proxy filtering
D) stateful inspection
Correct Answer:

Verified
Correct Answer:
Verified
Q19: How is the security of a firm's
Q20: Zero defects cannot be achieved in larger
Q46: You have just been hired as a
Q52: Smaller firms may outsource some or many
Q54: Approximately how many new threats from malware
Q55: Hackers create a botnet by<br>A) infecting Web
Q56: Inputting data into a poorly programmed Web
Q59: Electronic data are more susceptible to destruction,
Q84: Rigorous password systems<br>A)are one of the most
Q97: What are the security challenges faced by