A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

A. Content filter
B. Packet filter
C. IPS
D. IDS

Answer: A. Content filter

Computer Science & Information Technology

You might also like to view...

Packet filter firewalls operate at which of the following layers of the OSI model?

a. Application b. Network c. Session d. Transport

Computer Science & Information Technology

What two protocols are used in PPP to handle higher protocol encapsulation and connection control? Describe these two protocols.

What will be an ideal response?

Computer Science & Information Technology