Devices like firewalls, proxy servers, and routers control, manage, and monitor networking events using what form of management?
D. Rule-based management.
What IEEE standard denes interface port-based access control and authentication services?
C. IEEE 802.1x.
What is the military-sounding name for a special-purpose subnet that services public access requests and receives unauthorized or
unidentified traffic?
D. DMZ (demilitarized zone).
What TCP/IP service replaces a packet's private IP address with a public IP address before forwarding the packet onto the public
network?
A. NAT (network address translation).
What technology creates a simulated version of a computing environment?