Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic?
a. Application-aware devices
b. An application-aware device can analyze and manage network traffic based on the Application layer protocol that created it. Some of these devices can also apply quality of service (QoS) and traffic-shaping rules based on the application that created network traffic.
c. All-in-one security appliances combine many security functions into a single device. All-in-one security appliances are also known as unified threat security devices or web security gateways.
d. Network access control (NAC) controls access to the network by not allowing computers to access network resources unless they meet certain predefined security requirements.