✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Column A (Device) | Column B (Function) |
---|---|
1. Proxy Server | A. Logs keystrokes of attackers |
2. Honeypot | B. Filters harmful websites |
3. Internet Content Filter | C. Acts as intermediary for client requests |
4. Protocol Analyzer | D. Captures and decodes network packets |
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!