Which of the following is used to help define a baseline for normal activity on a firewall so that administrators will more likely notice any abnormal activity?

A) Firewall logs
B) Proxy servers
C) Bastion hosts
D) Screened hosts


A) Firewall logs

Computer Science & Information Technology

You might also like to view...

Which command compiles the Java source code file Welcome.java?

a. cd Welcome.java b. javac Welcome.java c. java Welcome.java d. compile Welcome.java

Computer Science & Information Technology

GUI programs are __________ because they respond to the actions of the user.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ tags are used to identify each choice in a drop-down list.

A.

  • B. C.
    D.

    Computer Science & Information Technology

    The stability index is a a number on a scale from _____.

    A. 1 to 5 B. 1 to 10 C. 1 to 15 D. 1 to 20

    Computer Science & Information Technology