Blocking all ports by default and allowing only those ports that are needed is known as ________.

Fill in the blank(s) with the appropriate word(s).


the deny-all principle

Computer Science & Information Technology

You might also like to view...

Which part of the NIST Cybersecurity Framework is designed to help an organization align its cybersecurity undertakings with business requirements, risk tolerances, and resources?

A) The Framework Tiers B) The Framework Core C) The Framework Profiles D) The Framework Outcomes

Computer Science & Information Technology

Which of the following is NOT an example of application software?

A) operating system B) photo-editing software C) spreadsheet D) word processor

Computer Science & Information Technology

How does a calculated field differ from an aggregate function?

What will be an ideal response?

Computer Science & Information Technology

You can also use the ____________________ page in a Contact window to track e-mail messages without having to turn on the Journal.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology