1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
15

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

Computers and Technology
1 answer:
Leni [432]3 years ago
7 0

Answer:

iptables

Explanation:

On a Linux system, iptables command allows us to modify settings of the built-in packet filtering firewall.

Iptables is used to set up, maintain, inspect and update the tables of IP packet filtering rules on Linux.

For example,

  • To view the current rule settings we can use the command:

# iptables -L -n -v

  • To add new firewall rules:

# iptables -I INPUT <rule number> -s <source-ip address> -j DROP

You might be interested in
A function ________ contains the statements that make up the function.
mestny [16]

Answer:

A) definition

Explanation:

3 0
3 years ago
It is easy to create good photographs of mountains because you can always tell how big they are. True False
Tanya [424]

False

From afar it may be difficult to be sure how big the mountains actually are

5 0
3 years ago
Read 2 more answers
Using the Internet, search and discuss why naming conventions are important and why programmers should consistently follow them.
LiRa [457]

Answer:

Answered below

Explanation:

Some variable naming conventions include;

1) Variable should begin with either a letter or an underscore.

2) Variables having multiple words should have the first letter of every word after the first word, capitalized. This is the camelCase style.

3) variables should not be named after any of the inbuilt keywords except on special operations to override the original function of such keyword.

4) variable names are case-sensitive.

The importance of following these conventions is to maintain readability and consistency of code. Failure to follow these conventions may lead to chaotic codes, bugs and inefficient performance.

7 0
3 years ago
Will robots take people's jobs? <br> write in complete sentence.
lilavasa [31]

Answer:

yes

Explanation:

yes because they already have them for old gun ships (which they still use) and they have made cars with them and more including bombing situations IED detinators they used in Afghanistan and in Iraq in 2011.

6 0
3 years ago
Can you right the C++ of this algorithm? Inizio = Start, Fine= End. THANK YOU SO MUCH!!
posledela
<span>#include <iostream> using namespace std; bool bears(int n); int main(){ int number; do{ cout<<"enter the amount of bears (press 0 to stop the program): "; cin>>number; if (bears(number)){ cout<<"you have reached the goal!"<<endl; } else{ cout<<"sorry, you have not reached the goal."<<endl; } }while(number != 0); } bool bears(int n){ if (n < 42){ return false; } else if (n == 42){ return true; } else{ if (n % 5 == 0){ return bears(n - 42); } else if(n % 2 == 0){ return bears(n / 2); } else if(n % 4 == 0|| n % 3 == 0) { int one; int two; one=n%10; two=(n%100)/10; return bears(n - one * two); } } <span>}</span></span>
4 0
3 years ago
Other questions:
  • 2. What does the Action tool allow you to do in Microsoft PowerPoint? (20 points)
    12·2 answers
  • How many bit does four gigabyte has
    8·2 answers
  • The array mycats is an 8 element array of type kitty that has already been declared and initialized. write the expression(s) in
    5·1 answer
  • Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address r
    9·1 answer
  • What are 3 ways to select an entire document?
    15·1 answer
  • You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used.
    15·2 answers
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
  • 100 points for this and brainlyist lol
    11·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • Which of the following is true about overloaded methods?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!