Which methods are used when implementing a proxy component within a firewall system?

Which methods are used when implementing a proxy component within a firewall system?

Which methods are used when implementing a proxy component within a firewall system?

A.
transparent or non-transparent

B.
inline or tap mode

C.
Layer 2 or Layer 3

D.
routed or bridged

E.
in-band or out-of-band

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *