Pete, the system administrator, wishes to monitor and limit users' access to external websites. Which of the following would BEST address this?

A. Block all traffic on port 80.
B. Implement NIDS.
C. Use server load balancers.
D. Install a proxy server.


Answer: D. Install a proxy server.

Computer Science & Information Technology

You might also like to view...

Two theorems that play important roles in public-key cryptography are Fermat's theorem and __________ theorem.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can quickly change an XMTML document into an HTML document just by altering the first three line of code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

User-derived data types fall into three categories: list, union, and restriction.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Find the error(s) in each of the following program segments, and explain how the error(s) can be corrected :

``` int sum(int n) { // assume n is nonnegative if (0 == n) return 0; else n + sum(n - 1); } ```

Computer Science & Information Technology