COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
port
|
|
router
|
|
server
|
|
network topology
|
Detailed explanation-1: -A way for a computer to identify specific programs and manage their activity. In an IP addresses, it appears after a colon at the end of the address such as :21, :80, and :443.
Detailed explanation-2: -A log file is an event that took place at a certain time and might have metadata that contextualizes it. Log files are a historical record of everything and anything that happens within a system, including events such as transactions, errors and intrusions.
Detailed explanation-3: -A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.