Match each item with an statement below:
A. originally used to reduce the amount of traffic on a network.
B. software security updates that vendors provide for their application programs and operating systems.
C. area in which a broadcast occurs.
D. establishes what action the firewall should take when it receives a packet.
E. set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
F. allows the user to restore specific browser settings if spyware infects the Web browser.
G. usually located outside the network security perimeter as the first line of defense.
H. the best defense against viruses.
I. helps prevent computers from becoming infected by different types of spyware.
A. Segmentation
B. Patch software
C. Broadcast domain
D. Rule base
E. Rootkit
F. Browser Restore
G. Hardware firewalls
H. Antivirus software
I. Antispyware
You might also like to view...
What is the efficiency of merge sort?
a. O(log n). b. O(n). c. O(n log n). d. O(n2).
A ________ box includes an arrow that when clicked displays a list of user selectable items
A) dialog B) drop-down C) pop-up D) combo
Heading 1 is an example of a(n) ________
Fill in the blank(s) with correct word
Briefly describe Trivial File Transfer Protocol (TFTP).
What will be an ideal response?