Which of the following is used to allow or deny access to network resources?
Access control list (ACL) is a rule list containing access control entries. It is used to allow or deny access to network resources. ACL can be
implemented on network users and network devices such as routers and firewalls. Routers and firewalls use ACL to determine which packets
should be forwarded or dropped.
Answer option A is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the
IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his
identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the
responses to be misdirected.
Answer option C is incorrect. System hardening is a term used for securing an operating system. It can be achieved by installing the latest
service packs, removing unused protocols and services, and limiting the number of users with administrative privileges.
Answer option D is incorrect. Network File System (NFS) is used to configure file servers on a network, so that users can store data in a
central location. It was originally developed for the UNIX operating system to mount remote file systems and directories. The NFS software
package in Linux includes commands and daemons for NFS, Network Information Services (NIS), and other network services.
Currently there are no comments in this discussion, be the first to comment!