Which of the following best describes the purpose of a firewall?
A. Passive devices that analyze network traffic to detect unauthorized access
B. Active devices that sit inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C. A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D. A device that monitors the characteristics of a single host and the events occurring on that host
Answer: C
Explanation: A firewall is a software or a hardware device that can filter incoming or outgoing traffic based on certain criteria.
You might also like to view...
A class that contains public methods that can change the data in the object of a class is called a/an:
a. mutable class b. immutable class c. invariant class d. none of the above
Explain why executions are always strict even if read locks are released after the last operation of a transaction but before its commitment. Give an improved statement of Rule 2 in Figure 16.16.
What will be an ideal response?
A class ____ consists of the operations permitted to be performed on an object's data members.
A. instantiation B. environment C. behavior D. state
In the case in which a hacker named Maxim broke into CD Universe credit card files, the FBI and company employees accessed original files to determine how the intrusion had occurred. What was the impact on the case of working with original files?
A) The case was nullified, because the last-access dates on the original files were changed. B) There was no impact on the case, because a correct chain of custody form was produced. C) The case was nullified, because the FBI did not have permission to open the original files. D) There was no impact on the case, because the original files were copied correctly.