Which of the following is a security approach that blocks users from visiting any website or Internet resource except those on an approved list?

A) Black listing
B) White listing
C) Gray listing
D) None of the above

B) White listing

Computer Science & Information Technology

You might also like to view...

________ view shows the data in a form and allows for data entry

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is done during the passive information gathering?

a. Run a port scan against the target system to find open ports. b. Search the company website for any useful information. c. Perform a ping scan against the target system. d. Attempt to connect to shared folders on the target system.

Computer Science & Information Technology