Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?

A. A host-based intrusion prevention system
B. A host-based firewall
C. Antivirus update system
D. A network-based intrusion detection system


Answer: B. A host-based firewall

Computer Science & Information Technology

You might also like to view...

Explain why the first step in imposing order on the procurement process is to require a fully documented justification for each procurement request.

What will be an ideal response?

Computer Science & Information Technology

Every Excel workbook file has details about the file that describe or identify the file, including the title, author name, subject, and keywords that identify the file's topic or contents, they are called ________

A) identifiers B) shared information C) properties D) documents

Computer Science & Information Technology

By default in Windows 7, the built-in Administrators group contains the local Administrator account

Indicate whether the statement is true or false

Computer Science & Information Technology

Rasterizing changes a vector graphic into a(n) ____ object, one that is made up of a fixed number of colored pixels.

A. clipping B. skewed C. bitmapped D. closed path

Computer Science & Information Technology