Top Posters
Since Sunday
j
22
22
i
19
a
18
z
18
m
17
D
17
16
j
16
K
16
s
16
a
16
New Topic  
wrote...
Posts: 175
Rep: 0 0
A week ago
The practice of funneling computer network traffic through certain points where it can be filtered and inspected for malware.  This is referred to as using:

▸ Planned redundancy

▸ Using choke points

▸ Network segmentation

▸ Reciprocity
Textbook 

Introduction to Security: Operations and Management

Edition: 5th
Authors:
Read 87 times
1 Reply
Replies
Answer verified by a subject expert
wrote...
Posts: 227
Rep: 9 0
A week ago
Sign in or Sign up in seconds to unlock everything.
Using choke points
1
Related Topics
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers.
Learn More
Improve Grades
Help Others
Save Time
Accessible 24/7
  140 People Browsing
Related Images
 153
 122