A firewall ______ is a tool that can provide information after an incident has occurred
a. Log
b. Scan
c. Port
d. None of the above
Answer A. Logs can provide valuable information and help ascertain the perpetrator of the attack.
Computer Science & Information Technology
You might also like to view...
Explain what routine tasks are.
What will be an ideal response?
Computer Science & Information Technology
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001
Computer Science & Information Technology