Multiple Choice
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) fault-tolerant computing
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Name and describe four firewall screening technologies.
Q39: CryptoLocker is an example of which of
Q40: Which of the following specifications replaced WEP
Q44: The distributed nature of cloud computing makes
Q46: All of the following are types of
Q47: An independent computer program that copies itself
Q66: Which of the following provides additional security
Q71: Why is software quality important to security?
Q71: When errors are discovered in software programs,the
Q89: Smartphones have the same security flaws as