Computer Networks Network Attacks
Q Firewalls are often configured to block ___________
  • A A. Udp traffic
  • B B. Tcp traffic
  • C C. Sensitive traffic
  • D D. Best-effort traffic
Leave a Comment