Identify four network hardening techniques.
What will be an ideal response?
A sampling of network-hardening techniques includes:
Design networks around switches and routers to control who accesses specific portions of a network.
Employ network firewalls and firewalls in operating systems.
Use a star-based network topology for more secure network designs.
Regularly monitor network activity.
You might also like to view...
You are improving a legacy system. You need to customize a software life cycle for your project. Which activities would you need? In which order?
What will be an ideal response?
All of the following statements are TRUE about gridlines EXCEPT:
A) Gridlines are used to demark one worksheet cell from another. B) Gridlines should remain visible except in very rare instances. C) Gridlines are very helpful during the development of a worksheet. D) Gridlines lend visual structure to a worksheet.
To declare an enumerated type, we must declare its identifier and its values.
Answer the following statement true (T) or false (F)
Which of the following is not a type of synchronous protocol?
a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP