V

Vinay • 28.75K Points
Instructor II Computer

  • (A) It is frequently used to protect a computer network from unauthorised access.
  • (B) It is a combination of both, software and hardware devices.
  • (C) It is unable to permit legitimate communication to pass.
  • (D) It permits network transmission based on a set of rules.
Correct Answer - Option(C)

No solution found for this question.
Add Solution and get +2 points.

You must be Logged in to update hint/solution

Discusssion

Login to discuss.

Be the first to start discuss.