Which of the following uses a profile-based approach to configuring firewall functionality?

IT Questions BankCategory: CyberOps AssociateWhich of the following uses a profile-based approach to configuring firewall functionality?

Which of the following uses a profile-based approach to configuring firewall functionality?

  • iptables
  • Windows firewall
  • Policy-based strategy
  • TCP wrappers
  • Anomaly-based strategy

Explanation: Windows Firewall uses a profile-based approach to configuring firewall functionality.

Exam with this question: 22.2.5 Check Your Understanding - Identify the Host-Based Intrusion Protection Terminology

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments