How should a firewall administrator guard against new risks?
What will be an ideal response?
A firewall needs regular care and attention to keep up with the new threats that are constantly appearing. It's a good idea, after the firewall is up and running, to monitor its activities on an ongoing basis and store, in the form of log files, all the data that accumulates. The administrator should periodically review the logs and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity
You might also like to view...
Which declaration declares abstract method method1 in abstract class Class1 (method1 returns an Integer and takes no arguments)?
a) Public Function method1() As Integer b) Public Function MustInherit method1() As Integer c Public MustInherit Function method1() As Integer d) Public Abstract Function method1() As Integer
Torvalds decided that Linux should conform to the ________ specification to enhance its interoperability with other UNIX-like systems.
a) POSIX b) ISO c) SUS d) LSB
What do we call an edit that has not been applied directly to artwork?
A. safe B. permanent C. non-destructive D. simple
Even if _______________ are on, you may be able to find a happy medium by setting per-app restrictions for apps that use mapping, geocaching, and/or tagging.
Fill in the blank(s) with the appropriate word(s).