A government agency wants to ensure that the systems they use have been deployed as security as possible. Which of the following technologies will enforce protections on these systems to prevent files and services from operating outside of a strict rule set?

A. Host based Intrusion detection
B. Host-based firewall
C. Trusted OS
D. Antivirus

Answer: B. Host-based firewall

Computer Science & Information Technology

You might also like to view...

The FV function calculates the monthly payment for a new loan

Indicate whether the statement is true or false

Computer Science & Information Technology

People view is the default view.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology