A firewall ______ is a tool that can provide information after an incident has occurred

a. Log
b. Scan
c. Port
d. None of the above


Answer A. Logs can provide valuable information and help ascertain the perpetrator of the attack.

Computer Science & Information Technology

You might also like to view...

Explain the disadvantages of using magnetic storage media and what you should do to counteract these disadvantages.

What will be an ideal response?

Computer Science & Information Technology

Produce a list of the names and addresses of all employees who work for the IT department.

What will be an ideal response?

Computer Science & Information Technology

The Navigation Pane contains ________ tabs

Fill in the blank(s) with correct word

Computer Science & Information Technology

Most instant messaging services provide a high level of encryption for their messages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology