Answer:
The correct answer to the following question is "Option C".
Step-by-step explanation:
Those other machines are using the proxy server to browse Web pages. If a Page is submitted by some other device, it is accessed by the proxy server before being sent to the requester.
- It is quite a role would be to maintain or hold the secret of the device because of security reasons behind it.
- Using a firewall application in combination with: This function includes the radio switches including choice checkboxes has been the most standard business firewall methodology.
The other three options are inappropriate because they are not related to the firewall methodology. That's why option C is the right answer.