Which device is used to control traffic flow between networks?
A ________ creates an encrypted tunnel to protect your personal data and communications.
Which physical controls protect against electromagnetic eavesdropping?
Which of the following best describes a zero-day vulnerability?