While implementing a proxy component within a firewall system, which method will be used?
A.
In-band or out-of-band
B.
Layer 2 or Layer 3
C.
Transparent or non-transparent
D.
Routed or bridged
While implementing a proxy component within a firewall system, which method will be used?
While implementing a proxy component within a firewall system, which method will be used?
A.
In-band or out-of-band
B.
Layer 2 or Layer 3
C.
Transparent or non-transparent
D.
Routed or bridged