What are configuration rules? Provide examples.
What will be an ideal response?
Configuration rules are instructional codes that guide the execution of the system when information is passing through it. Rule-based policies are more specific to the operation of a system than ACLs are, and they may or may not deal with users directly. Many security systems require specific configuration scripts that dictate which actions to perform on each set of information they process. Examples include firewalls, intrusion detection and prevention systems (IDPSs), and proxy servers.
Computer Science & Information Technology
You might also like to view...
A poster is an example of a text-based chart
Indicate whether the statement is true or false
Computer Science & Information Technology
The first time you save a document, the Save dialog box appears.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology