menu
Qammunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Which of the following best describes a proxy firewall? A. It sends traffic through another host. B. It acts as a gateway for requests arriving from the client. C. It checks onl…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Which of the following best describes a proxy firewall? A. It sends traffic through another host. B. It acts as a gateway for requests arriving from the client. C. It checks onl…
asked
Sep 11, 2021
202k
views
2
votes
Which of the following best describes a proxy firewall? A. It sends traffic through another host. B. It acts as a gateway for requests arriving from the client. C. It checks only the IP and protocol. D. It is typically run on the host system.
Computers & Tech
college
Kellyb
asked
by
Kellyb
8.2k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
7
votes
The answer would be B, for your computer is considered a client instead of server.
Apotek
answered
Sep 15, 2021
by
Apotek
8.2k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
May 15, 2022
229k
views
Select the correct answer. What is a demilitarized zone? A. an intermediary network that connects a LAN and the Internet B. a proxy server that acts as a firewall C. an IP host D. a network that provides
Miku
asked
May 15, 2022
by
Miku
8.2k
points
Computers & Tech
college
1
answer
1
vote
229k
views
asked
Mar 14, 2019
94.1k
views
Proxy manipulation occurs when a false dhcp server that can provide ip address configuration leases for a unique subnet and define the default gateway because the hacker's computer acts as a mitm router/proxy.
Troy Rockwood
asked
Mar 14, 2019
by
Troy Rockwood
7.9k
points
Computers & Tech
college
1
answer
0
votes
94.1k
views
asked
Sep 5, 2024
182k
views
This network access control determines which IP packets are allowed entry to a network and which are dropped. a. Firewall b. Intrusion Detection System (IDS) c. Virtual Private Network (VPN) d. Proxy Server
Kmecpp
asked
Sep 5, 2024
by
Kmecpp
8.1k
points
Computers & Tech
high-school
1
answer
5
votes
182k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity.org