1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
11

Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address

10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?
Computers and Technology
1 answer:
Luden [163]3 years ago
7 0

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

You might be interested in
In the lab, wireshark continued to capture data in the background until the:
Alex17521 [72]
In the lab, Wireshark continued to capture data in the background until the capture process was manually stopped later in the lab.
Wireshark is a packet analysis tools, it gets the information for traffic passing through a specific network node.

5 0
3 years ago
What is company NDR?​
lina2011 [118]

Answer:

Explanation:

NDR is a multinational American based company with international branches in Thailand, Cambodia, and Myanmar in the telecom industry and media with sales of over US$100 Million. The company develops application store (APP Store) and application (APP) for mobile devices with 700,000+ apps in the app store.

7 0
3 years ago
The high-latitude climate is _____________ the equator.<br><br> closest to<br> farthest from
BARSIC [14]
I believe it’s farthest from
5 0
3 years ago
2) A language that changes code to machine-readable code one command at a time is known as what
iogann1982 [59]

Answer:

2) Interpreted programming languages (e.g. Python, Perl)

3) In computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. That means that the each programing language has its own specific rules.

4) Pseudocode

5) Cryptographic coding, examples: The Caesar shift, Kryptos

5 0
3 years ago
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinet
s344n2d4d5 [400]

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

6 0
3 years ago
Other questions:
  • A desktop _______ produces creative digital designs with illustration software.
    12·1 answer
  • Write a program that creates a dictionary containing the U.S. states as keys and their capitals as values. (Use the Internet to
    10·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • The marketplace for computer hardware:________ 1. has become increasingly concentrated in top firms 2. has expanded to include a
    5·2 answers
  • How can I put my keyboard back​
    9·1 answer
  • A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
    14·1 answer
  • A computer is made up of hardware and software ​
    5·1 answer
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • 2. The<br>is the main and usually largest data storage hardware device in a computer​
    9·1 answer
  • The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!