Which methods are used when implementing a proxy component within a firewall system?
A.
transparent or non-transparent
B.
inline or tap mode
C.
Layer 2 or Layer 3
D.
routed or bridged
E.
in-band or out-of-band
Explanation:
Which methods are used when implementing a proxy component within a firewall system?
Which methods are used when implementing a proxy component within a firewall system?
A.
transparent or non-transparent
B.
inline or tap mode
C.
Layer 2 or Layer 3
D.
routed or bridged
E.
in-band or out-of-band
Explanation: