Identify four network hardening techniques.

What will be an ideal response?


A sampling of network-hardening techniques includes:
Design networks around switches and routers to control who accesses specific portions of a network.
Employ network firewalls and firewalls in operating systems.
Use a star-based network topology for more secure network designs.
Regularly monitor network activity.

Computer Science & Information Technology

You might also like to view...

You are improving a legacy system. You need to customize a software life cycle for your project. Which activities would you need? In which order?

What will be an ideal response?

Computer Science & Information Technology

All of the following statements are TRUE about gridlines EXCEPT:

A) Gridlines are used to demark one worksheet cell from another. B) Gridlines should remain visible except in very rare instances. C) Gridlines are very helpful during the development of a worksheet. D) Gridlines lend visual structure to a worksheet.

Computer Science & Information Technology

To declare an enumerated type, we must declare its identifier and its values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a type of synchronous protocol?

a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP

Computer Science & Information Technology