Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following should the security administrator implement to limit web traffic based on country of origin?