A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall
Answer: D. Application aware firewall
Computer Science & Information Technology
You might also like to view...
You can create a new query from scratch or create a query from a(n) ______
a. existing query b. existing report c. imported Excel file d. Form Wizard
Computer Science & Information Technology
The StringBuilder contents at the end of this segment will be ________.
``` StringBuilder sb = new StringBuilder("a toyota"); sb.insert(2, "landrover"); sb.delete(11, 16); sb.insert(11, " "); ``` a. a landrovertoyota b. a landrover a c. a landrov a d. a landrover toy a
Computer Science & Information Technology