A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall


Answer: D. Application aware firewall

Computer Science & Information Technology

You might also like to view...

When creating a String object, if a character array and two integers are passed to the String constructor, then the created String contains:

a) the characters of the array from the index specified by the first integer for the number of characters represented by the second integer. b) the characters of the array from the index specified by the first integer to the index specified by the second integer. c) all of the characters except those between the indices represented by the two integer values. d) None of the above.

Computer Science & Information Technology

Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.

A. circuit B. packet C. connection D. line

Computer Science & Information Technology

The most common personal printer is the ________ printer

A) inkjet B) photo C) laser D) plotter

Computer Science & Information Technology

A TV remote has keys for channels 0-9. You select one key at random. What is the probability that you select a channel that is an even number?

What will be an ideal response?

Computer Science & Information Technology