An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?

A. Unified Threat Management
B. Virtual Private Network
C. Single sign on
D. Role-based management


Answer: A. Unified Threat Management

Computer Science & Information Technology

You might also like to view...

Which fields in a table are required fields by definition?

A) A field with a primary key B) A field with a default value C) A field with a lookup List D) A field with an input mask

Computer Science & Information Technology

If a column does not end where you want it to, you can end the column at a location of your choice by inserting a manual ________.

a. section break b. column break c. paragraph d. page break

Computer Science & Information Technology

The ____________________ data file contains the hashed representation of the user's password.

A. SLA B. SNMP C. FBI D. SAM

Computer Science & Information Technology

A(n) ____________________ folder is the location of a document or message to be copied or moved.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology