Which of the following is used to help define a baseline for normal activity on a firewall so that administrators will more likely notice any abnormal activity?
A) Firewall logs
B) Proxy servers
C) Bastion hosts
D) Screened hosts
A) Firewall logs
Computer Science & Information Technology
You might also like to view...
Which command compiles the Java source code file Welcome.java?
a. cd Welcome.java b. javac Welcome.java c. java Welcome.java d. compile Welcome.java
Computer Science & Information Technology
GUI programs are __________ because they respond to the actions of the user.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The ____ tags are used to identify each choice in a drop-down list.
A.
B.
Computer Science & Information Technology
The stability index is a a number on a scale from _____.
A. 1 to 5 B. 1 to 10 C. 1 to 15 D. 1 to 20
Computer Science & Information Technology