You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
A. Implement a firewall.
B. Implement an IPS.
C. Implement a UTM appliance.
D. Implement identity-based ACLs.
E. Implement an IDS.
Answer: C
You might also like to view...
For each user account, Windows Vista creates a(n) ________ labeled with the account holder's name
Fill in the blank(s) with correct word
_____ is a limited internal acceptance test where employees of a software development organization and a limited number of other "friendlies" use the software and provide feedback.
a. Gamma testing b. Beta testing c. Delta testing d. Alpha testing
Explain when it would be useful to display formulas instead of formula results in a worksheet.
What will be an ideal response?
Which two options are valid to create vApp in the vSphere Environment (Choose two)
a. Login using vSphere C# Client to the ESXi host, right click on the host and select Create new vAPP b. Login using vSphere Host Client to the ESXi host, right click on the host and select Create new vAPP c. Login using vSphere Web Client to the vCenter Server, right click on the cluster and select create new vAPP d. Login using vSphere Web Client to the vCenter Server, right click on the standalone ESXi host and select Create new vApp.