What are configuration rules? Provide examples.
What will be an ideal response?
Configuration rules are instructional codes that guide the execution of the system when information is passing through it. Rule-based policies are more specific to the operation of a system than ACLs are, and they may or may not deal with users directly. Many security systems require specific configuration scripts that dictate which actions to perform on each set of information they process. Examples include firewalls, intrusion detection and prevention systems (IDPSs), and proxy servers.
You might also like to view...
In what version of the ISO 12207 standard is the operation's process treated as a separate primary process, due to the fact that it is not technically part of the development lifecycle?
Fill in the blank(s) with the appropriate word(s).
Answer the following questions true (T) or false (F)
1. UML provides no facility for describing libraries. 2. If what you need is not in UML, you can add features to UML.
Which of the following data should be entered as a label?
A. telephone number B. price C. volume D. distance
The ____ is required as part of the CSS language for colors in hexadecimal values.
A. pound symbol B. exclamation point C. ampersand D. question mark