Once an attacker gains remote control access over a system, they want to retain this illicit access. Some attackers will block the system update service to prevent new updates from fixing vulnerabilities that are needed to maintain remote control over the compromised system. To prevent such a compromised system from allowing the attacker to access resources on the network, what security mechanism should be implemented?

A. Network access control
B. A Web security gateway
C. Complex password authentication
D. Intrusion detection system


Answer: A. Network access control

Computer Science & Information Technology

You might also like to view...

Give the output from this code fragment:

``` int *p1, *p2; p1 = new int; p2 = new int; *p1 = 10; *p2 = 20; cout << *p1 << “ “ << *p2 << endl; *p1 = *p2; cout << *p1 << “ “ << *p2 << endl; *p1 = 30; cout << *p1 << “ “ << *p2 << endl; ```

Computer Science & Information Technology

Which of the following cannot be used for establishing a link like the one in the accompanying figure?

A. video clip B. text C. image D. image map

Computer Science & Information Technology

A stylus can serve as an alternative to a mouse, simulating clicking and right-clicking

Indicate whether the statement is true or false

Computer Science & Information Technology

To differentiate between the connections, ____ uses multiple public TCP and UDP ports to create unique sockets that map to internal IP addresses.

A. PAT B. static NAT C. dynamic NAT D. virtual NAT

Computer Science & Information Technology