Which of the following technologies is the MOST cost-effective when protecting a large number of networked workstations from external attacks?

A. Host-based IDS
B. External scanning service
C. Network-based firewall
D. Network-based IPS


Answer: C. Network-based firewall

Computer Science & Information Technology

You might also like to view...

When you create a custom category and group in the Navigation Pane, the database objects first display under Unassigned Objects

Indicate whether the statement is true or false

Computer Science & Information Technology

On a report, ________ calculate totals for smaller groups of records

Fill in the blank(s) with correct word

Computer Science & Information Technology

Disks that are formatted using the GUID Partitioning Table (GPT) can hold larger volume sizes, and benefit from increased reliability provided by which feature below?

A. Cyclic Redundancy Check (CRC) B. Message Digest 5 (MD5) C. Secure Hash Algorithm (SHA) D. Journaling

Computer Science & Information Technology

Explain when you would insert hyperlinks in a worksheet.

What will be an ideal response?

Computer Science & Information Technology