1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w

ould be to block all inbound packets to the designated Telnet port (23). We might want to block inbound packets to other ports as well, but what inbound TCP connections must be permitted in order not to interfere with outbound Telnet
Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
5 0

Answer:

Another way to block all inbound packets is to use the firewall layer of the circuit.

Explanation:

The firewall circuit layer is a firewall containing a table with four fields, mainly such as source port, destination port, source IP address, and destination IP address.

They are containing mainly the addresses or the ports that need to be blocked.   So we want to block all inbound packets, and also set the source port to 23 while the rest is set to zero, meaning that all inbound packets are blocked.

You might be interested in
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Each web site contains a(n) ____ page, which is the first document users see when they access the site.
katrin2010 [14]
Home is the answer. Hope this helps. :)
7 0
3 years ago
2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column n
DiKsa [7]

Answer:

for(i=0; i<4; i++)

{

      for(j=0;j<6;j++)

      {

               A[ i ][ j ] = 2* i - 3*j;

      }

}

Explanation:

In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.

3 0
3 years ago
An isp is a group of updates, patches, and fixes that apply to specific oss.
olasank [31]
<span>The statement that an ISP is a group of updates, patches, and fixes that apply to specific OSs is false.
</span> ISP stands for Internet service provider, while OSS stands for Operations support system.<span> The term ISP denotes a company or</span><span> organization that provides services for accessing, using, or participating in the Internet. OSS on the other hand is used by the providers to manage their networks.
</span>
4 0
3 years ago
Computers influenced the outcome of world war 2 by?
Elan Coil [88]

Answer:

Computers were introduced to the U.S. Navy on the eve of war for submarines. The computers used trigonometry to help the submariners know when to fire their torpedoes at a moving target. These devices were expanded to surface ships to provide more accurate firing of the guns.

Explanation:

3 0
2 years ago
Other questions:
  • All of the following are stages in the SDLC except _____.
    9·1 answer
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • The ____ is a new feature in versions of microsoft office, starting with office 2007; it consists of tabs, which contain groups
    5·1 answer
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • What are the main differences between a workgroup and a domain?
    14·2 answers
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • Which if the following is an effect of intellectual property theft?
    6·2 answers
  • You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
    5·1 answer
  • The instructions in the language of alice are contained on ____ which you can drag and drop into place to ____ new programs
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!