A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall

Answer: D. Application aware firewall

Computer Science & Information Technology

You might also like to view...

You can create a new query from scratch or create a query from a(n) ______

a. existing query b. existing report c. imported Excel file d. Form Wizard

Computer Science & Information Technology

The StringBuilder contents at the end of this segment will be ________.

``` StringBuilder sb = new StringBuilder("a toyota"); sb.insert(2, "landrover"); sb.delete(11, 16); sb.insert(11, " "); ``` a. a landrovertoyota b. a landrover a c. a landrov a d. a landrover toy a

Computer Science & Information Technology