1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
7

What kind of firewall can block designated types of traffic based on application data contained within packets?

Computers and Technology
1 answer:
Bess [88]3 years ago
4 0

Answer:

Content Filtering Firewall.

Explanation:

  • Content Filtering Firewall can block designated types of traffic based on application data contained within the packets.
  • This ensures that objectionable websites , web portals, emails containing objectionable material can be screened.
  • This blocks the access to that particular content.
  • This helps in keeping away Malware and secure the network and systems.
  • Both hardware and software can be used to implement the content filters.
You might be interested in
Many digital libraries have much more information than traditional libraries
Grace [21]

Answer:

However, despite 10 great breakthroughs of 2018 in technology, traditional libraries are still around – the British Library in London, the Library of Congress in Washington, D.C., the New York Public Library, the Bavarian State Library and many more which you can find in the list of 25 most famous libraries of the world. Although they don’t shy away from implementing some of the novelties into their structure and organization – all of them have quick access to the Internet. Well, why is it so? Is it going to keep that way? Just like in case with any other topic, making predictions is an ungrateful task, for the world is most likely to develop in the least predictable way – just like it always does. Let’s look at the ‘battle’ between digital and traditional libraries.

Explanation:

5 0
3 years ago
14 Copy a picture of a crane on the next page. Do not trace them. Make a freehand sketch. (2) 2 Look at the placed where the Mar
PtichkaEL [24]

Answer:

Hope it helps.have a look.

3 0
2 years ago
Given the following schedule, show the locks that will occur and the subsequent schedule. Assume that strict 2PL is in effect, w
Alexxandr [17]

Answer:

see explaination

Explanation:

Please kindly check attachment for the step by step solution of the given problem

4 0
2 years ago
Which of the following is a good way to improve your credit score?
Ganezh [65]
The answer is chope this helps
6 0
2 years ago
The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of
Mice21 [21]

Solution:

The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of the name and selecting of ignoring all.

Thus the required right answer is B.

8 0
3 years ago
Other questions:
  • What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port m
    6·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • I have a question on an IT crossword the question is as follows
    12·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • You will be creating a quiz grading program. You will compare the student's answers with the correct answers, and determine if t
    15·1 answer
  • When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by st
    13·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
  • What are node in a computer network​
    14·1 answer
  • Finish the format string to get the output shown below.<br> Day<br> &gt;&gt;&gt;{ v8'_format('Day)
    5·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!