answersLogoWhite

0

Firewalls restricts traffic onto a network or onto an individual system. Firewalls can restrict users, web sites, and files from being moved across the network.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What is the device that connects many digital subscriber lines to a network by multiplexing the DSI traffic onto one or more network trunk lines?

DSLAM


What is a network traffic analyzer used for?

A network traffic analyzer is used for analyzing and monitoring the use of network traffic for many devices. Network Traffic Analyzer is also used to monitor the wireless network performance.


How VLAN reduces the network traffic?

yes, it reducing the network traffic


How do you trace the network traffic?

Tracing network traffic requires a network monitor, protocol analyzer, or packet sniffer.


Which ethernet card can handle gigabit network traffic?

You would need the ethernet card can handle gigabit network traffic cable.


Which type of network traffic requires high reliability and security but can sustain a low bandwidth connection in a converged network?

"transactional traffic" is the righ answer.


Spillage happens when classified information is entered onto an unclassified network?

Classified information is entered onto an unclassified network.


What network device directs network traffic?

who do Kobe Bryant play for


Can be used to reduce traffic bottlenecks in a netbeui network?

To reduce traffic bottlenecks in a NetBEUI network, implementing network segmentation can be effective. By dividing the network into smaller segments, broadcast traffic is limited, allowing for improved performance and reduced congestion. Additionally, using higher-capacity network devices, such as switches, can help manage traffic flow more efficiently. Lastly, minimizing unnecessary broadcasts and optimizing network configurations can further alleviate bottlenecks.


What are some of the most popular programs used to monitor a business's network traffic?

Some of the most popular programs which are used to monitor traffic within a business network include PRTG, Network Monitor, Network Eagle and Nagios.


How do you detect zombies in a network?

If you monitor traffic on computers on a network and find traffic occurring when no user is logged on, you probably have a zombie, especially when you are getting outbound traffic when no authorized used is actually using the system.


Is a software-based tool that continually monitors network traffic from a server or workstation attached to the network?

Network monitor.