The design goals for a ________ are: acts as a choke point, enforces the local security policy, is secure against attacks.

Fill in the blank(s) with the appropriate word(s).

overflow
13. firewall

Computer Science & Information Technology

You might also like to view...

The SmartArt type that shows steps in a process or timeline.

A. Radial B. Process C. List

Computer Science & Information Technology

What is database security?

A) A specialty within computer security that protects a database application from unintended use B) Protecting assets you can touch, such as computers, storage devices, backup tapes, and office safe C) Protecting the information that resides on the physical devices, including databases and other computer software D) A tabbed menu system that ties the objects in the database together

Computer Science & Information Technology