You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
A. Implement a firewall.
B. Implement an IPS.
C. Implement a UTM appliance.
D. Implement identity-based ACLs.
E. Implement an IDS.
Answer: C
You might also like to view...
A JavaFX app’s main class directly inherits from ________.
a. Main b. Application c. App d. Object
Answer the following statements true (T) or false (F)
1) When creating XML documents, document authors must use the set of XML tags that the W3C provides. 2) The pound character (#), the dollar sign ($), ampersand (&), greater-than (>) and less-than (<) are examples of XML reserved characters. 3) XML is not case sensitive. 4) An XML document may contain only one root element. 5) XML displays information.
WLANs are based on de jure standards.
Answer the following statement true (T) or false (F)
To modify an existing rule, select the role you want to modify, click the ____ button in the Rules and Alerts dialog box, and then click the Edit Rule Settings command.
A. Change Rule B. Adjust Rule C. Modify Rule D. Rules Wizard