1 / 5 A network device for managing the optimal distribution of workloads across computing resources is called:
2 / 5 Which of the following answers lists a /27 subnet mask?
3 / 5 Which of the following protocols are used for securing HTTP connections?
4 / 5 Allowing a connection through a firewall is known as creating:
5 / 5 Which of the IPsec modes provides entire packet encryption?