Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?
A. application search
B. application control
C. firewall monitoring
D. virus control
Answer: C
Computer Science & Information Technology
You might also like to view...
When drawing a table, the pointer is displayed as a(n) ________
A) pencil B) cross-hair C) I-beam D) pen
Computer Science & Information Technology
Visual Basic, C, C++, and Java are all examples of ____ languages.
a. assembly b. machine-level c. low-level d. high-level
Computer Science & Information Technology
What are the most limiting factors in a host?s ability to run virtual machines?
A. Hard disk space and RAM B. Network bandwidth and driver C. CPU and RAM D. Hard disk space and router
Computer Science & Information Technology
Access includes a Database Splitter tool that analyzes objects in the database and suggests potential solutions to improve performance.
a. true b. false
Computer Science & Information Technology