A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?
A. Content filter
B. Packet filter
C. IPS
D. IDS
Answer: A. Content filter
Computer Science & Information Technology
You might also like to view...
Packet filter firewalls operate at which of the following layers of the OSI model?
a. Application b. Network c. Session d. Transport
Computer Science & Information Technology
What two protocols are used in PPP to handle higher protocol encapsulation and connection control? Describe these two protocols.
What will be an ideal response?
Computer Science & Information Technology