A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall
Answer: D. Application aware firewall
You might also like to view...
When creating a String object, if a character array and two integers are passed to the String constructor, then the created String contains:
a) the characters of the array from the index specified by the first integer for the number of characters represented by the second integer. b) the characters of the array from the index specified by the first integer to the index specified by the second integer. c) all of the characters except those between the indices represented by the two integer values. d) None of the above.
Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.
A. circuit B. packet C. connection D. line
The most common personal printer is the ________ printer
A) inkjet B) photo C) laser D) plotter
A TV remote has keys for channels 0-9. You select one key at random. What is the probability that you select a channel that is an even number?
What will be an ideal response?