1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
9

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Computers and Technology
2 answers:
Free_Kalibri [48]3 years ago
7 0
Firewall

-------------------------------
stira [4]3 years ago
7 0

Answer:

Firewall

Explanation:

Generally in English, firewall can be described as a wall or barrier that is meant to prevent fire from spreading.

In computing, firewall refers to a network security system or  a piece of computer software that is meant or used to prevent unwanted data to gain access to the system.

The primary function of firewall is to monitor and regulate entry and exist of network traffic based on the security rules that have all already been determined or put in place. It does this by putting in place a barrier among the external network that are trusted or the ones that are not trusted like the internet.

Therefore,  firewall is software that acts as a filter to prevent unwanted packets from entering a network.

You might be interested in
What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
zaharov [31]
A proxy server. A system requests information from the internet, and that traffic is routed through the proxy server before arriving to the requesting system.

This is why proxy servers are used for hiding identity and being more secure, as internet traffic would show the IP address of the proxy server, and not the requesting system, though this often depends on the type of proxy server, as some proxy server's main objective isn't anonymousity, but rather efficiency.
4 0
3 years ago
Is it possible build a real time machine?
Helga [31]

Answer:

Travelling in time might sound like a flight of fancy, but some physicists think it might really be possible. BBC Horizon looked at some of the most promising ideas for turning this staple of science fiction into reality.

Explanation:

7 0
3 years ago
Read 2 more answers
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
2 years ago
Read 2 more answers
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • You're browsing the Internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    5·2 answers
  • What is the purpose of the print area feature​
    11·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • Write a C program that uses a while statement to determine and print the largest of 10 numbers input by the user. Your program s
    6·1 answer
  • What is good work ethic?​
    11·1 answer
  • DUE SOON NEED HELP FAST!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!