1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
11

Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address

10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?
Computers and Technology
1 answer:
Luden [163]3 years ago
7 0

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

You might be interested in
Where in an email would u find information about the action requirements​
Assoli18 [71]

Answer:When trying to find the action that you need to do in an e-mail, it is best to consult the body of the email, also known as (B) in the message.. The message would detail the tasks that you need to tackle, which are generally not detailed in the subject line, greeting, and you will most definitely not find in the to field.

Explanation:

3 0
2 years ago
Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the numbers from 1 to 10 with
emmasim [6.3K]

Answer:

create the integer variable and initialize it to one, with the do statement, increment the variable by one and print it, then the while statement checks if the variable is less than or equal to 10.

#include <iostream>

using namespace std;

int main(){

   int i = 1;

   do {

       cout<< i << "\n";

       i++;

   }

   while (i <= 10);

}

Explanation:

The C++ source code initializes the integer variable i to one and increments and print the value if the value is less than or equal to ten. The do-while statement executes a block of code before the condition is implemented.

4 0
3 years ago
What are some catchy names for computer basics that you would put on a childrens poster?
Triss [41]

Answer:

not sure

Explanation:

6 0
3 years ago
Write a SELECT statement that joins the Categories table to the Products table and returns these columns: category_name, product
Sphinxa [80]

Answer & Explanation:

1) Query:

SELECT Product_Name, Category_Name, List_Price

FROM Products AS P JOIN Categories AS C

ON C.Category_ID = P.Category_ID

ORDER BY Category_Name, Product_Name ASC;

2) Query:

SELECT C.Last_Name, C.First_Name, Order_Date, P.Product_Name, Item_Price, Discount_Amount, Quantity

FROM Customers AS C JOIN Orders AS O

ON C.Customer_ID = O.Customer_ID

JOIN Order_Items AS OI

ON O.Order_ID = OI.Order_ID

JOIN Products AS P

ON OI.Product_ID = P.Product_ID

ORDER BY Last_Name, Order_Date, Product_Name;

3) Query:

SELECT Category_Name, Product_ID

FROM Categories LEFT JOIN Products

ON Categories.Category_ID = Products.Category_ID

WHERE Product_ID IS NULL;

4) Query:

SELECT 'SHIPPED' AS Ship_Status, Order_Id, Order_Date

FROM Orders

WHERE Ship_Date IS NOT NULL

UNION

SELECT 'NOT SHIPPED' AS Ship_Status, Order_ID, Order_Date

FROM Orders

WHERE Ship_Date IS NULL

ORDER BY Order_Date;

3 0
3 years ago
Timothy is a multimedia designer. He needs to create a prototype of a new product that his firm is launching. Which multimedia s
mestny [16]

Explanation:

The answer is D. 3-f modeling

5 0
3 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • What is a computer??????????????????????????????????????????????????????????
    12·2 answers
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • Each time the user selects an item from a list box in a web page, a postback occurs, the web page will redisplay, and the page_l
    12·1 answer
  • The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
    8·1 answer
  • Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
    15·1 answer
  • How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
    15·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Fre.....ee p......oint....s
    15·2 answers
  • Name:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!