The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.

Fill in the blank(s) with the appropriate word(s).


logs

Computer Science & Information Technology

You might also like to view...

Which of the following is a metric that predicts the equipment runtime before a failure requires the equipment to be replaced?

a. MTTF b. MTBF c. MTTR d. All of the above are correct. e. None of the above is correct.

Computer Science & Information Technology

When an invitation file is sent to someone using Remote Access, it includes a login and password

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is an invalid IP address/prefix to assign to a host?

A. 172.31.0.255/16 B. 172.16.255.128/25 C. 201.18.149.32/26 D. 10.255.0.0/8

Computer Science & Information Technology

A DBMS separates the logical and physical views of the data.

a. true b. false

Computer Science & Information Technology