Why is a bastion host the system most likely to be attacked?

A. it has weak security
B. it contains company documents
C. it is available to external users
D. it contains the default administrator account


Answer: C

Computer Science & Information Technology

You might also like to view...

At lower screen resolutions, text and objects appear larger, but the apparent work area is smaller.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Design a remote object table that can support distributed garbage collection as well as translating between local and remote object references. Give an example involving several remote objects and proxies at various sites to illustrate the use of the table. Show what happens when an invocation causes a new proxy to be created. Then show what happens when one of the proxies becomes unreachable

What will be an ideal response?

Computer Science & Information Technology

A multi-page form enables the user to display only the data that needs to be accessed

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following means the data is from a known source?

a. Confidentiality b. Integrity c. Authentication

Computer Science & Information Technology