A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).

A. War driving
B. War chalking
C. MAC filtering
D. FTP bouncing
E. Port filtering


Answer:
C. MAC filtering
E. Port filtering

Computer Science & Information Technology

You might also like to view...

The ________ normal form requires that the table has to be free of transitive dependencies

Fill in the blank(s) with correct word

Computer Science & Information Technology

Users can format a calculated field by changing the format in the ________ for the new calculated field

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the information security principle that requires significant tasks to be split up so that more than one individual is required to complete them?

A. need-to-know B. eyes only C. least privilege D. separation of duties

Computer Science & Information Technology

Because anyone can publish information to the Internet, it is important to carefully assess the _________________________ of the webpage content.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology