Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
Which of the following network design elements allows for many internal devices to share one public IP address?
Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?