A firewall ______ is a tool that can provide information after an incident has occurred
a. Log
b. Scan
c. Port
d. None of the above
Answer A. Logs can provide valuable information and help ascertain the perpetrator of the attack.
Computer Science & Information Technology
You might also like to view...
Explain the disadvantages of using magnetic storage media and what you should do to counteract these disadvantages.
What will be an ideal response?
Computer Science & Information Technology
Produce a list of the names and addresses of all employees who work for the IT department.
What will be an ideal response?
Computer Science & Information Technology
The Navigation Pane contains ________ tabs
Fill in the blank(s) with correct word
Computer Science & Information Technology
Most instant messaging services provide a high level of encryption for their messages.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology