Multiple Choice
Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry.These entry points are known as ____.
A) screens
B) logged areas
C) intrusions
D) holes
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q29: What is the most important benefit of
Q30: Microsoft _ is a complex, full-featured firewall
Q31: To enhance security, firewall rules can be
Q32: How should organizations cope with proxy server
Q33: URLs are blocked on a proxy server
Q35: Network administrators _ to set up the
Q36: A _ firewall combines several different security
Q37: In a typical transaction, a proxy server
Q38: Squid is a full-featured Windows-based firewall that
Q39: Match each item with a statement below.<br>-A