Which methods are used when implementing a proxy component within a firewall system? seenagape 9 years ago Which methods are used when implementing a proxy component within a firewall system? A. transparent or non-transparent B. inline or tap mode C. Layer 2 or Layer 3 D. routed or bridged E. in-band or out-of-band Explanation: ← Previous question Next question →