A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).
A. War driving
B. War chalking
C. MAC filtering
D. FTP bouncing
E. Port filtering
Answer:
C. MAC filtering
E. Port filtering
You might also like to view...
The ________ normal form requires that the table has to be free of transitive dependencies
Fill in the blank(s) with correct word
Users can format a calculated field by changing the format in the ________ for the new calculated field
Fill in the blank(s) with correct word
What is the information security principle that requires significant tasks to be split up so that more than one individual is required to complete them?
A. need-to-know B. eyes only C. least privilege D. separation of duties
Because anyone can publish information to the Internet, it is important to carefully assess the _________________________ of the webpage content.
Fill in the blank(s) with the appropriate word(s).