COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?
A
Firewall
B
Switch
C
URL Content Filter
D
Spam Filter
Explanation: 

Detailed explanation-1: -Pete, the system administrator, wishes to monitor and limit users’ access to external websites. What would BEST address this? Install a proxy server.

Detailed explanation-2: -The Security Compliance Manager is a downloadable tool that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and for Microsoft applications.

Detailed explanation-3: -Which one of the following might a security team use on a honeypot system to consume an attacker’s time while alerting administrators? Pseudoflaw, false vulnerability in a system that may attract an attacker.

Detailed explanation-4: -Overview. Storage Spaces Direct provides fault tolerance, often called “resiliency, ‘’ for your data. Its implementation is similar to RAID, except distributed across servers and implemented in software.

Detailed explanation-5: -Perimeter device logs. Windows event logs. Endpoint logs. Application logs. Proxy logs. IoT logs.

There is 1 question to complete.