You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
  
Which of the following would best meet the requirements of the client?

A. Implement a firewall.
B. Implement an IPS.
C. Implement a UTM appliance.
D. Implement identity-based ACLs.
E. Implement an IDS.


Answer: C

Computer Science & Information Technology

You might also like to view...

A JavaFX app’s main class directly inherits from ________.

a. Main b. Application c. App d. Object

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) When creating XML documents, document authors must use the set of XML tags that the W3C provides. 2) The pound character (#), the dollar sign ($), ampersand (&), greater-than (>) and less-than (<) are examples of XML reserved characters. 3) XML is not case sensitive. 4) An XML document may contain only one root element. 5) XML displays information.

Computer Science & Information Technology

WLANs are based on de jure standards.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To modify an existing rule, select the role you want to modify, click the ____ button in the Rules and Alerts dialog box, and then click the Edit Rule Settings command.

A. Change Rule B. Adjust Rule C. Modify Rule D. Rules Wizard

Computer Science & Information Technology