The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.
Fill in the blank(s) with the appropriate word(s).
logs
Computer Science & Information Technology
You might also like to view...
Which of the following is a metric that predicts the equipment runtime before a failure requires the equipment to be replaced?
a. MTTF b. MTBF c. MTTR d. All of the above are correct. e. None of the above is correct.
Computer Science & Information Technology
When an invitation file is sent to someone using Remote Access, it includes a login and password
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is an invalid IP address/prefix to assign to a host?
A. 172.31.0.255/16 B. 172.16.255.128/25 C. 201.18.149.32/26 D. 10.255.0.0/8
Computer Science & Information Technology
A DBMS separates the logical and physical views of the data.
a. true b. false
Computer Science & Information Technology