A firewall ______ is a tool that can provide information after an incident has occurred

a. Log
b. Scan
c. Port
d. None of the above

Answer A. Logs can provide valuable information and help ascertain the perpetrator of the attack.

Computer Science & Information Technology

You might also like to view...

Explain what routine tasks are.

What will be an ideal response?

Computer Science & Information Technology

The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001

Computer Science & Information Technology