1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
10

The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po

rt address to enter through the firewall.
Computers and Technology
1 answer:
kolbaska11 [484]3 years ago
8 0

Answer:

Dynamic packet-filtering firewall.            

Explanation:

Packet filtering is basically a technique of scanning and filtering the network data packets. This technique allows or disallows the network packets to enter through the firewall or to transmit from one network to the other. Dynamic packet filtering packet-filtering firewall allows only a particular packet with a particular source, destination, and port address to enter through the firewall. It utilizes the information in packet header and inspects and utilizes active connections state information. This information enables to decide which packet should enter through the firewall.

You might be interested in
GUI allows users to communicate with a device and see what they are doing onscreen.
zloy xaker [14]
The answer is true.
Gui basically is the thing that lets you see your desktop and what your doing. The G means graphics. Makes sense. If we didn't have GUI, then we would have to type in code to access documents, and do things on the computer. GUI changes that.
8 0
3 years ago
Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
shusha [124]
It be known as spyware
3 0
3 years ago
If a driver who is under the age of 21 is stopped by a law enforcement officer and has a blood alcohol level of 0.02 or greater
lions [1.4K]

having their driving privilege suspended for six months.

5 0
3 years ago
A tornado destroyed many
m_a_m_a [10]

Answer:

D is your answer because I'm an expert

5 0
3 years ago
Read 2 more answers
According to chronology, arrange the steps that you need to take during the installation of a ram stick?
MAXImum [283]

Answer:

first off you need to take of the screws make sure its unpluged and you open up to see the mother bored

Explanation:

6 0
3 years ago
Other questions:
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • Which of these are forms of data? Check all that apply.
    8·2 answers
  • Xavier would like to change the sort options for his contacts. In which tab will he find the Arrangement command group?
    6·1 answer
  • Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
    13·1 answer
  • What are the advantages and disadvantages of the various collision resolution strategies for hashes?
    7·2 answers
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!