Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?

A. Zone filtering
B. Signature identification
C. Port identification
D. Port scanner


Answer: B. Signature identification

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Using layers is an effective way to build websites since it does not require any pop-up pages. 2. Ajax involves the use of JavaScript and extensible markup language (XML). 3. With Ajax, as new data is needed, the browser sends a request to the server, and the server sends a small amount of data back to the browser, which updates the current page. 4. Two basic buttons should be included on every Web fill-in form: Submit and Clear.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

a) When String objects are compared using ==, the result is true if the Strings contain the same values. b) A String can be modified after it’s created.

Computer Science & Information Technology

Which term describes a graphical representation of the radio frequency (RF) sources on a site?

A. Unbounded media B. Beamforming C. Heat map D. Distributed Coordination Function (DCF)

Computer Science & Information Technology

You can choose document type options in the Save As dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology