The use of a(n) _________ prevents unauthorized intruders from accessing a computer network because the host or server will only permit access via inbound calling from prespecified phone numbers.
a. Automatic number identification
b. network cloaking device
c. call-back codec
d. Trojan horse
e. call-forward modem
Answer: a. Automatic number identification