Which methods are used when implementing a proxy component within a firewall system? seenagape 13 years ago Which methods are used when implementing a proxy component within a firewall system? A.transparent or non-transparent B.inline or tap mode C.Layer 2 or Layer 3 D.routed or bridged E.in-band or out-of-band ← Previous question Next question →