A ________ is a means of grouping firewall rules so that they apply to the affected computers dependent on where the computer is connected

a. Policy
b. Profile
c. State
d. Cluster


B. You may define different firewall behavior for domain, private, and public profiles.

Computer Science & Information Technology

You might also like to view...

Queries in Access can be exported as a web page

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

A) VoIP B) Mail C) Internet D) E-mail

Computer Science & Information Technology

Which of the following is an information system that captures and processes data from day-to-day business activities?

A. Transaction Programming System B. Transaction Processing System C. Transaction Processing Site D. Transaction Proposal System

Computer Science & Information Technology

Systems developers use joint application development (JAD) whenever group input and interaction are not desired, because it is linked to a specific development methodology.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology