Which of the following can Pete, the security administrator, implement to filter Internet traffic?

A. Warning banners
B. Spam filters
C. Host-based firewalls
D. Command shell restrictions


Ans: C. Host-based firewalls

Computer Science & Information Technology

You might also like to view...

Which of the following apply to Spanning-Tree Protocol? (Select all that apply.)

a. It is a link-management protocol. b. It replaces RIP as the routing protocol for switches. c. It is used to minimize hops. d. It is used to prevent loops.

Computer Science & Information Technology

Multiple filters can be applied to a PivotTable

Indicate whether the statement is true or false

Computer Science & Information Technology

The binary number 11000000 represents what number below in decimal?

A. 160 B. 192 C. 224 D. 240

Computer Science & Information Technology

Use the Format>Align menu options to line up associated controls so controls are consistently placed in the same row or column.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology