by
_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’. Intrusion Detection Systems Anti-virus Firewall Anti-malware

1 Answer

0 votes
by

_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.

Intrusion Detection Systems

Anti-virus

Firewall

Anti-malware

Related questions

0 votes
    A centrally managed solution that protects networks and all their endpoints against threats with the help of ... Endpoint Protection 3. Endpoint Security 4. Network Security...
asked Oct 24, 2020 by JackTerrance
0 votes
    Endpoint security solutions provide a decentralized solution to protect endpoints. 1. False 2. True...
asked Oct 24, 2020 by JackTerrance
0 votes
    Which among the following usually refers to an on-premise solution? 1. Endpoint Protection 2. Endpoint Security...
asked Oct 24, 2020 by JackTerrance
0 votes
    Network administrators can create their own ACL rules based on _______ ________ and _______ (a) Address, Protocols and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In Network Management System, the division that is responsible for controlling access to network based on a ... Fault Management C. Security Management D. Active Management...
asked Feb 14, 2023 in Technology by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following feature of endpoint security solutions involves real time monitoring of network topology ... Centralized Security Management All of these Continous Detection...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    The __________ defines the packet filtering firewall rules. (a) Access Control List (b) Protocols (c) Policies (d ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Network traffic can be controlled in _______ ways. A. 1 B. 2 C. 3 D. 4...
asked Nov 21, 2022 in Education by JackTerrance
0 votes
    Based on the network security protocols, which of the following algorithms are used to generate message digests? (1)DES (2)AES (3)MD5 (4)RSA...
asked Mar 21, 2021 in Technology by JackTerrance
0 votes
    I want to exclude specific participants from a DataFrame and create it from an existing DataFrame. I want a method ... worked for me. Select the correct answer from above options...
asked Jan 23, 2022 in Education by JackTerrance
0 votes
    Fill in the blanks: “to ensure failover capabilities, consider using a _____ for incoming traffic on a network interface Select the correct answer from above options...
asked Nov 26, 2021 in Education by JackTerrance
0 votes
    Fill in the blanks: “to ensure failover capabilities, consider using a _____ for incoming traffic on a network interface Select the correct answer from above options...
asked Nov 25, 2021 in Education by JackTerrance
0 votes
    The general idea of field _________ is to set rules or constraints on what data can be entered in data field. Select the correct answer from above options...
asked Nov 26, 2021 in Education by JackTerrance
...