Which of the following can Pete, the security administrator, implement to filter Internet traffic?
A. Warning banners
B. Spam filters
C. Host-based firewalls
D. Command shell restrictions
Ans: C. Host-based firewalls
Computer Science & Information Technology
You might also like to view...
Which of the following apply to Spanning-Tree Protocol? (Select all that apply.)
a. It is a link-management protocol. b. It replaces RIP as the routing protocol for switches. c. It is used to minimize hops. d. It is used to prevent loops.
Computer Science & Information Technology
Multiple filters can be applied to a PivotTable
Indicate whether the statement is true or false
Computer Science & Information Technology
The binary number 11000000 represents what number below in decimal?
A. 160 B. 192 C. 224 D. 240
Computer Science & Information Technology
Use the Format>Align menu options to line up associated controls so controls are consistently placed in the same row or column.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology