In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?