Which of the following technologies is the MOST cost-effective when protecting a large number of networked workstations from external attacks?
A. Host-based IDS
B. External scanning service
C. Network-based firewall
D. Network-based IPS
Answer: C. Network-based firewall
You might also like to view...
When you create a custom category and group in the Navigation Pane, the database objects first display under Unassigned Objects
Indicate whether the statement is true or false
On a report, ________ calculate totals for smaller groups of records
Fill in the blank(s) with correct word
Disks that are formatted using the GUID Partitioning Table (GPT) can hold larger volume sizes, and benefit from increased reliability provided by which feature below?
A. Cyclic Redundancy Check (CRC) B. Message Digest 5 (MD5) C. Secure Hash Algorithm (SHA) D. Journaling
Explain when you would insert hyperlinks in a worksheet.
What will be an ideal response?