1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
8

Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri

ng rules inspecting packets in isolation from their context both inspecting packets for which there are good application proxy filtering rules and inspecting packets in isolation from their context neither inspecting packets for which there are good application proxy filtering rules nor inspecting packets in isolation from their context
Computers and Technology
1 answer:
inna [77]3 years ago
7 0

Answer:

The answer to the following question is "inspecting packets in isolation from their context".

Explanation:

Static Packet Filtering a technique for implementing security of the firewalls. In this process, it checks each packet against a group of commands if commands allow the type of packet then it is passed otherwise, it is dropped. It controls access to a network by analyzing the sending and receiving packets based on the IP addresses of the source and destination.

You might be interested in
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Sveta_85 [38]

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

4 0
3 years ago
Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and s
S_A_V [24]

Answer:

// program in C++.

#include <bits/stdc++.h>

using namespace std;

int main() {

//  variable  

int num;

cout<<"Enter the number between 20 and 98: ";

// read number

cin >> num;

while(num<20||num>98)

{

   cout<<"Wrong input!!enter number between 20-98 only:";

   cin>>num;

}

cout<<"The output is: ";

while(num % 10 != num /10)

{

// print numbers.  

cout<<num<<" ";

// update num.

num--;

}

// display the number.

cout<<num<<endl;;

return 0;

}

Explanation:

Read a number from user and assign it to variable "num".Check if entered number  is in between 20-98 or not.If input number is less than 20 or greater than 98 then  ask again to enter a number between 20-98 until user enter a valid input.Then print  the countdown from input number till both the digit of number are same.

Output:

Enter the number between 20 and 98: 99                                                                                    

Wrong input!!enter number between 20-98 only:12                                                                            

Wrong input!!enter number between 20-98 only:93                                                                            

The output is: 93 92 91 90 89 88

Enter the number between 20 and 98: 77                                                                                    

The output is: 77

7 0
3 years ago
The ____ is composed of tabs, each containing groups of related commands.
Mashutka [201]
Ribbon im pretty sure is your answer
3 0
4 years ago
There are three required elements needed to connect to the internet: hardware, web browser, and __________.
malfutka [58]

Yes the answer is D.internet service.

7 0
3 years ago
Read 2 more answers
100 POINTS!!!!
Alisiya [41]

Answer:

☆<em>intellectual property</em>☆

<u>intangible </u><u>a</u><u>s</u><u>s</u><u>e</u><u>t</u><u>s</u><u> </u><u> that result from intellectual</u><u> </u><u>p</u><u>r</u><u>o</u><u>p</u><u>e</u><u>r</u><u>t</u><u>y</u><u> </u><u>.</u>

<u>☆</u><u>I</u><u>n</u><u>t</u><u>a</u><u>n</u><u>g</u><u>i</u><u>b</u><u>l</u><u>e</u><u>☆</u><u>;</u>

<u>s</u><u>o</u><u>m</u><u>e</u><u>t</u><u>h</u><u>i</u><u>n</u><u>g</u><u> </u><u>t</u><u>h</u><u>a</u><u>t</u><u> </u><u>c</u><u>a</u><u>n</u><u>n</u><u>o</u><u>t</u><u> </u><u>b</u><u>e</u><u> </u><u>t</u><u>o</u><u>u</u><u>c</u><u>h</u><u>e</u><u>d</u><u>.</u>

<em>P</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>M</em><em>a</em><em>r</em><em>k</em><em>☆</em>

<em>A</em><em>r</em><em>i</em><em>a</em><em>♡</em>

5 0
3 years ago
Other questions:
  • Where would you look to see how much space is available on your c drive?
    8·1 answer
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Which of the following keys open the spelling and Grammer dialog box
    6·1 answer
  • In programming, what is a string?
    8·2 answers
  • What happens if none of the selector values match selector in a simple case expression in pl/sql
    6·1 answer
  • If a web address is written as http://www.mywebprescence.com/index.html: What part of this address is considered to be the webpa
    8·1 answer
  • Ava is at her first job interview, and the interviewer asks her a difficult question she hasn't prepared to answer. What should
    10·2 answers
  • Write a C program to find the sum of 10 non-negative numbers entered by user​
    14·1 answer
  • What's the difference between an exe file and an msi file? check all that apply.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!