The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.

Fill in the blank(s) with the appropriate word(s).

logs

Computer Science & Information Technology

You might also like to view...

Where can you find the Tab button in Word 2010?

A) on the Quick Access Toolbar B) on the status bar C) on the ruler D) on the Ribbon

Computer Science & Information Technology

Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?

A. WPS B. WSS C. WEP D. AES

Computer Science & Information Technology