The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.
Fill in the blank(s) with the appropriate word(s).
logs
Computer Science & Information Technology
You might also like to view...
Where can you find the Tab button in Word 2010?
A) on the Quick Access Toolbar B) on the status bar C) on the ruler D) on the Ribbon
Computer Science & Information Technology
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?
A. WPS B. WSS C. WEP D. AES
Computer Science & Information Technology