Pete, the system administrator, wishes to monitor and limit users' access to external websites. Which of the following would BEST address this?
A. Block all traffic on port 80.
B. Implement NIDS.
C. Use server load balancers.
D. Install a proxy server.
Answer: D. Install a proxy server.
You might also like to view...
Two theorems that play important roles in public-key cryptography are Fermat's theorem and __________ theorem.
Fill in the blank(s) with the appropriate word(s).
You can quickly change an XMTML document into an HTML document just by altering the first three line of code.
Answer the following statement true (T) or false (F)
User-derived data types fall into three categories: list, union, and restriction.
Answer the following statement true (T) or false (F)
Find the error(s) in each of the following program segments, and explain how the error(s) can be corrected :
``` int sum(int n) { // assume n is nonnegative if (0 == n) return 0; else n + sum(n - 1); } ```