John has implemented________in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.
A . DMZ
B . Proxies
C . VPN
D . NAT
Answer: D
John has implemented________in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.
A . DMZ
B . Proxies
C . VPN
D . NAT
Answer: D