Question: 2 7 From a security perspective, a ( n ) _ _ _ _ _ _ _ _ _ _ _ masks the identity of

27 From a security perspective, a(n)___________ masks the identity of a client and limits the usefulness of network sniffing.
a) router
b) proxy server
c) switch
d) firewall
28. Which of the following audit tools is used to identify rogue systems and services?
a) checklists
b) integrity checking
c) vulnerability scanners
d) IP/port scanners
29. A common technique often used in high security environments to establish an unalterable paper trail for log files is called____________.
a) remote logging
b) printer logging
c) security logging
d) cryptographic technology

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!