A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?

A. A cloud-based antivirus system with a heuristic and signature based engine
B. A network based firewall which blocks all inbound communication
C. A host-based firewall which allows all outbound communication
D. A HIDS to inspect both inbound and outbound network communication


Answer: C. A host-based firewall which allows all outbound communication

Computer Science & Information Technology

You might also like to view...

In the linked list implementation of the queue, we had both a destructor and a makeEmpty function because:

A. the destructor needs to call the makeEmpty function B. the client may want to empty out the queue without destroying it; however, the client shouldn’t have to remember to use makeEmpty to avoid memory leak upon destruction of the queue C. the makeEmpty function needs to call the destructor; otherwise, the queue cannot be destroyed D. only one is used to free dynamic memory, the other cannot

Computer Science & Information Technology

Suppose you define a Java class as follows:

``` public class Test { } ``` In order to compile this program, the source code should be stored in a file named a. Test.class b. Test.doc c. Test.txt d. Test.java e. Any name with extension .java

Computer Science & Information Technology

What are three symptoms of a processor problem? (Select three.)

A) You smell a burning odor. B) The computer shows a blinking cursor in the upper-left corner. C) You smell an odor of sour lemons. D) The system boots briefly and then shuts down. E) An error code appears. F) The computer plays tones of increasing intensity.

Computer Science & Information Technology

Click the ____ button in the Chart Layouts group to choose a chart layout from the Layout Gallery.

A. Chart Style B. Chart Layout C. Quick Access D. Quick Layout

Computer Science & Information Technology