NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Firewall
|
|
Switch
|
|
URL Content Filter
|
|
Spam Filter
|
Detailed explanation-1: -Pete, the system administrator, wishes to monitor and limit users’ access to external websites. What would BEST address this? Install a proxy server.
Detailed explanation-2: -The Security Compliance Manager is a downloadable tool that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and for Microsoft applications.
Detailed explanation-3: -Which one of the following might a security team use on a honeypot system to consume an attacker’s time while alerting administrators? Pseudoflaw, false vulnerability in a system that may attract an attacker.
Detailed explanation-4: -Overview. Storage Spaces Direct provides fault tolerance, often called “resiliency, ‘’ for your data. Its implementation is similar to RAID, except distributed across servers and implemented in software.
Detailed explanation-5: -Perimeter device logs. Windows event logs. Endpoint logs. Application logs. Proxy logs. IoT logs.